Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
da9fb17edab1516167e897293ee469f5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da9fb17edab1516167e897293ee469f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da9fb17edab1516167e897293ee469f5_JaffaCakes118.html
-
Size
139KB
-
MD5
da9fb17edab1516167e897293ee469f5
-
SHA1
0fcfa1aab48d2679ad0afcf0f1efc3749f466916
-
SHA256
426aa4a0c7e29e73b005b96c313174f584c37f8340f854a2064aeab3d8f599b7
-
SHA512
b573dae30a64f08168acf55482e8d74f016b3cee970bd2a661845f599c815f2329e1ec5864dcd2003ed2c3c9520de849ed5c79aa85c12e90e26a37075d18a5e4
-
SSDEEP
1536:Sekd5ZA92Pl2syLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SekRA9ZsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C338051-7050-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432229380" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007a1f28f92fb2c03ac960d43b90756aacf4f5a5b317034d308082bc6ec9799abd000000000e8000000002000020000000bcecb7726082a1f3064c383ce04aafbd73bf790db05296fe104d747835e41c7b90000000d138ac6bd53ce386a606b7d82cda5e6fac4775e16ef9ba9c5b718b0846cd03a2d357561664b5e8cace499bf9622e5443b84dac1cb120efb492271b78ed7b15a3b34c0c64e3dccba9e7f26afc0c2cca100c3b846dc3e0ebb379dab9fb25245e5ebf655a703852e5eff38db10149cc0bf45d93d8d487ab029a76cf6ddfe031895e5bed6e0436194864c05c2975f86dd37640000000bcabc96cc78c0cc33dbfce9310d384cf97ef15cb2e4c29603bf0b02f50cb625cfbdc272259e46c77861555481626f9a6f1caf56b837389974d94a646413751ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000221d9ec358ca268e09000ad797d8d429b87fbfbdb6e4b9f28192b5a01af3432000000000e8000000002000020000000a8cd92cd6898ee01dbdb449640cb0e96f22a3554586568d9d692cfedf51ec0a020000000d979ac707bef6b21b9df1bbcee25923a439856727c8b7b0919fdd446dea6b4634000000076a8154f39e1356be273e5e12d71ce07697f6bfd82e68b60718188c8276599860fa47c6f2b905c2822cfe51fa674e31ff1347a23acee1b26e5b3ec3006affce6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d065425d04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2756 2552 iexplore.exe 28 PID 2552 wrote to memory of 2756 2552 iexplore.exe 28 PID 2552 wrote to memory of 2756 2552 iexplore.exe 28 PID 2552 wrote to memory of 2756 2552 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da9fb17edab1516167e897293ee469f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2dcf7f1a85d6428a8cc1945f5bc1181
SHA1c499d93b58f5ac0fcfbc19895955fdd232f5537c
SHA256708debdac0f5ae77b98115936ed1dd509b7e6d372840bb84c3679e921d0358df
SHA512e713b3924e90cfc9510f25b8da5f9844bc651c8ee4e13d2766b22da7529a2723f794c800cbede2dc66780a7bdfa10490b016ecb619f1de82765268c5e2654439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839a8d5ebb70131970be77afbab92303
SHA17e1d36c89dd5cd0521315e1d35d1838a6c00896a
SHA256d4a9fff40c37dcbddf9096f9ee8d9aa8755e039cb0420cb4ced41cff9dd366dc
SHA5123d0fb4da1c677a31282b2a461554fd307f3adee67c4f1f858632fca051a03b539832ed7ef8c5881208f4d1034e27b81321dc39ee9d3fafa3cc2270a94b8bea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2672ce67bcbc42c6cef87107e9c87aa
SHA129257b0283a0929103f0e1b9607bac29be518c29
SHA256892bb75df64472aedb3020a5fb458d306c1f520080c75efe51486f75a19eab78
SHA5125075fb8d271a1113bcc8525f96b86e816713ce532e2458d405c8318376de4b4569ef2b7b58c62e5ded1e86e3badae471067020e604c1662f55f5733503e1defc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f043bf50315f4155d5ba7f5f566ac49
SHA10412d239bf5e4de725400bbd4a0725b3ed726c24
SHA256f072163eb956ed60b70ff05c299f7956c51c1e22dc10836105ca21fbf37f0c19
SHA512a50b1f8777c21bf7ad905ec58070dc32c83be86a131f41aa17b887320fd27f8f112bac6df3d241d2f6cd2f5ff64e4c28f066c224d5bc5e872379efb4f2826a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927d35729a3e8a35bc693d45b89ce8d8
SHA1fcf36b4559b03d3ff9360d6fca267cf43b78860a
SHA2562e7813e0ba45e13ce2bde8a7f85e7850e7ef9f0933748efa8f7cc6ad585e26ee
SHA5120e60541f4735658d135146c4c9cfb567a3084856d31b25e3954e5e84ffd7abb6adac6f07257df914ab6227b785c93eb1ba66d6ce7fe11000a891b000f2217515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d136f7c59bfc55e7551ca222029e682
SHA1f46e25f9cb4cdbe4a443efad372a3e1c1dbfd64a
SHA256f21bd2375850df1a912a03b96dc25bc097bb04f10b4336fc4e082e3e024c1544
SHA512684808f4dfd069b6b79c80ef22ffb2a060a29533d2c75d12753a39ef9d299cd1ad9ff01eaaa322d159eb8498b1c5725aaca7c8e6a32140ca350b4cd82ebfed00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080a7c45cf01ad95dfc7abaabc14db14
SHA1380f6c61c2f4a8e1325054d15a0e30e4244f814e
SHA2562975e56e04f2867b93546820081669c10f9b4303e1600a7ff81eadbf31ac4506
SHA5127e9116e133a147e95b58996b48e4635ac99ebaa3237a04ee45809644e7408a5187967a14562594a56a96b26426557697be0af3f94b9b936cdacf2f6bed019b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf20a3888eef3db6e67a8de1dd1282b
SHA1c2be21841109a2ef2776cb6be084f9bf0a19a412
SHA25630cbcf1f58d677fd4b37ae71258d5f35ba8d952bc8a1fdefcec0b4fd73c5f837
SHA51263eeb5da7ed55f2642a1270852314b576f721f8cdb3a752d147b0d162826ad429c4b0b57f4f82534f81e2b6755784033ea66c9c6f2c80ee22d472f47db9053c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52798f550d101039a012c927ec0278b42
SHA16bca0e5d1879c71448edd27c4e4c449f83d5f6bd
SHA2565c2d841b41df7f83d91612bfab82e1c3476ab568edab92e3f4858decf7c49747
SHA512b5d9568c122d8aa1bfaad2d9bb80c9e5c3b289cd9b8c7f689421afba4534a6d5a82096c5776c3b01ce77be14a092bbc3f059800e7600dd34e0c3598d09f701ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e8f1c21100efda44ccf3af29fce1cb
SHA16f5b27a3b274e2a92a50da2557c356a9f9f2232b
SHA2560b3234975d837c1f4a211478f3d6c641b7e7054068af8fec4ecd247216664447
SHA51269461fd0993121c4c14037ed5bf0b128d3542859a9ab7a403d1b4e2f3c56836faa1ec32f9e69f546da4293d8992f5a9ca7dda43e7b65be72dfc72b73c9374177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cfc3cf57da06fdff91eb9b8010d25e
SHA1fc34dda698729c206d6ff966ff1162032635a2bc
SHA256752a97fe1e615227b1dcfa950d095627e0e41cd394502fd3fd47627fc5a834a1
SHA51226b08dd6b5a423fc96df9d56dcfcc7b96042a00cde9522894161332a448b606a35804b130e37204b4f799d9d4b5b526e9dd4e3312b01a1427542bd5babf25902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2f1f96c79649b4a453c7d4772bc3e2
SHA1638c16dfa06bc374ef264d6b96382ef2186fc945
SHA25691eb0bed31af9f4053e91a4d794ee7ec1b88541efdd7eff724c9a3df9edc50ca
SHA512f99add0ba0c0ca2f3f91a480863d56c9552c473b849b291d9c1d7bc027c37f4d10cf146eaa7c2f812c6418d47cb390c88524fa189cd3e3f0fbc2d96d54464d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29e7b19b2f4a33d7363e3070f4ecf68
SHA17610d08a6ab9dce51d3dbe513191feeac1a3a6cc
SHA256da6b88fda315effd49203e32b1124a13653693127b475b8b1ac183569ab3e664
SHA512d4a83b8f04b91ab535ac4b0e31ced88e751503f7d9f4ceeca2c9a4e6215a4aca8f02ba2924a558095cbf5eb91853657f0b5512cb945ff908eb3765f401ecb518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d15a4da96f3bfaf96856f6504442ff0
SHA11867f212b500c6149ab46c82fa697e5dcbc67799
SHA25629c781ba262c62aa1e5456a90b16466a42b5dc4fed61d900a6d03f44073be2ed
SHA5128c54b8d2da54e9c39962deed628cf5bff471cbdbd54e8ea46ad09319d1858f82c3bb9da3b2456073c569154f744c2fe7e80189f0e58f07842b6550a1016614d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585a93fa4ec23dbb1f0b1efeef2a5ac5
SHA1b5d0d675d50608792d13506d5da7dc0e069f3c4c
SHA2561eb6ec51f758c2eca5dcafb1fd43f71f0c7e8339042545a8a8fbc5e803423c27
SHA51288ee5efd7a6b16b654ff6b9a299cfc7acc7796904ee40cb10fa9a6a82c6f0101611058e884da7e4772d4f4bea969ef69c82bf016e4fd6c90ffade490fc192354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d965aaacbb94ed86c8941aaa1b57df51
SHA18725df8c3dac0ff3ba0b2fce53252b5cb653e7f9
SHA2560ff0ed8dcbd5270ac2fc45164657789e1f13c57f3470f8bc5e9dceadb2d19bbe
SHA51202ac6bcb2aca1a5dee948a767d6c48bf5b50342242bfdeca8e5f22ab66b055198a65c3d392ab11f1da4127a0ee622ee06613dda2a2feacce7ff8387bcf2a5fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9146d02ef7f72ac1482a7f93eae88a0
SHA15905b0edc604fe528e216bb88ccd181cb8fe8283
SHA256ff8af33e009861bd4dfe2afd999e2db93ced3537d357c82a4ab2104dbf9ed39a
SHA512757a098e274b78aff559e578ba4d54528bfe07996576efb5bd14c5e29b9ab245de6ec7816af443351a7e2919ef73cada27882b91439bc316e05e5f7cfbef47d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f3069f7b0683d9d09e9c906efdfed2
SHA1a603ac7aee6f9e133dca19071a15bf71cbaabd53
SHA256276a5b7e35ae5f63ba9ff03063eec6d6020ebbebb91d5c00665c7dff5a7f4e2f
SHA512c17f3cfed3bb3395ec37f2b7a0cf7422fd2be7ad00a1390726d8e168b387c3d5173bd11332acecacada65035fbe49e726e2a897b836b03f6cfb1c669859eb48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50577a1a87b96728e00ec906670bc7775
SHA1c50ddec529ed6ce8ee28098e815d501260f9626d
SHA2567d79173182e17e0212e1dc564a6cd3d87dfe2abb6f7d5fa090fdd3f0088843ad
SHA512b9618cde48ccb33342b4dbdbc15c7f2d10f9e5cc271d0a64732890df47ddc37da0436ecb8a471dd82e540b53f66c673541bb562bdaa7f2e765ee9e2d123b1d58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b