Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
ea2fd5ad6c90aa521d0bf77d981ea1b8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea2fd5ad6c90aa521d0bf77d981ea1b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea2fd5ad6c90aa521d0bf77d981ea1b8_JaffaCakes118.html
-
Size
32KB
-
MD5
ea2fd5ad6c90aa521d0bf77d981ea1b8
-
SHA1
c0d6d0d3c473b6bc73c245d1e6211b66b505b68b
-
SHA256
ad9cecf373711e2e386b74bce6941ddad7b54c7dffaef848aa9c1e8f7e522cb0
-
SHA512
d34f61b447fc5f5837692061ca6ebe57f82bbf525df86b45b2043173093de3ebdf5d370e24d0e53c7228e4066e8c82f80a17d20a5bc7eff78802d6b882a25767
-
SSDEEP
192:uWjVb5na1nQjxn5Q/FnQie4NnpnQOkEntfznQTbnxnQnMCcA9bLU/IfyINcsitOn:ZQ/9KOLuxVP2ZIAlkPOSk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fe725392bf26e7c404682911537423c6b5266436e62af265f1d679b91cc24c68000000000e8000000002000020000000d86f0e3111711d09b44157e2ee9f4c65f40cf5775954cc3b9fc0ce8c31afa4e190000000c55ada6523e09d8cce705981049eeaf7ed0ddae8998069c5aef19658c331cf8b3da72c13c0a9a7668eefea7e34ceb583c299a98b940cb0633971fd6583fcd6f656a3849dc1402c1ea70bfb7500021591f0815c5d72d392e648e6e9fb9028295fba5bc79189c698de6793f8ff8462a801a38c7e9e60b0e48d9cac5a52ce6da87a71bb4bb0c6b807d0d690f2c1a1aed6bd40000000b7e4a643887d71f92ca251ede5ca7f63a0e39b6d698b1bbff569e198fcec52a7fd14170d99cefe2d8b4893d3bc6ace27262c20df276313c697406477c9c46e05 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cfab21240adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B6D2C11-7617-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000351d1f04c4562ee9a0cec21934d7c92ce7f66738ee1a2488d66ed0c67612ab3c000000000e80000000020000200000006a0fcd84256a54f4f686516e3cb63f64da8aa20ab23dfa9c13d4277fe168141020000000b14cfe112ae4f652cba2c1db2bafcf1efd401dfe3b42e31a329323e6d8ea5daa40000000dfcb09806a80eb740b116676e8f5ee73548dd3357073b38e2940a0878462cf82d0ba13f817cee0262b97f36ad95e7d32146be4cb90da9af81fa99153c7b2d154 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432864657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2468 2120 iexplore.exe 31 PID 2120 wrote to memory of 2468 2120 iexplore.exe 31 PID 2120 wrote to memory of 2468 2120 iexplore.exe 31 PID 2120 wrote to memory of 2468 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea2fd5ad6c90aa521d0bf77d981ea1b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c550304eb9fe0d2124c2cff5e38346
SHA115ea14f9c15b9ff865373a14f397fd071f45a7bd
SHA2566c4058aedb71f55058e9731870935a275459dd34897cd32cca6c82ffb3a1222f
SHA51220d231744883e2410735b54fab8f53a4c884ceb651cd0b111468f8e3c8e6a6689400a2c9fff476c4e726265b7f9f03b0081435516c06e8df4c14cb456d8cbbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50126f18a3ed9b910e5c54eec3947ee1d
SHA1f6b04dadca9a44d8d1e57d5cacc127f44d6dada1
SHA256b46e43bb6a682c23165a54c590a85562309f8c5947e287a5f8b4b4144ba9b552
SHA51248075ec1806dc8eb5e6ebb5decbf989de9e24b6dbb6fef70fc8f2f94926fe82f900f75b1078d45107990031170ef8c692e4b736b1570d816fd42808e30e18f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517afa798f3c9e4d96b992fbdfe191a84
SHA17a0e9ed1075cfb66645ca40c0edcb6fe88f41818
SHA25603f1b42454643d9163d49e5d74c5eecac03ad98a605360814d0bb3c18bfcd2ff
SHA512b8a32a0e91bd5659bbc2c28305b97b6e48782f33ac2c4f316abaffe871e1d4179979e96c564d3ecfc8c03a05a39594ec142be33914b8ca5dc86cdaa2a9089ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e27d7b08e005b966ccc891cbaae6aac
SHA1ccb1dfc4d73c488fb4f4ed09f9f5f47c163caa56
SHA256b2822c5307c52f9f6078fe35d80c0f2254e618b9fd9f8cacd3ef21408a6eb7b1
SHA512cca9ab101045f2f4056e08f787d46939184111545593a9ce64266682cb134470653d10509745953789a9901b6898943ff0a8d4b3248e1c8567d64012acc4fd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b5a8d13e991e89ac354d4856ebc08b
SHA1c408a87e59a436343308d071d6df77865b35a471
SHA256ac829587d179403f716f29ce086860b5ad547467bd9a6a777accc1d0841eab1d
SHA5126fefbaed212dd63e51e8b7a4a7aaa2c4c5bbaa5d324591c9828e275c857a9425dd8ed060d67fa800a5d2ab109c3dd8c7dc38246d62dd4eef3a1efa66f8c4aaf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0bdfe504d68776b75d7baaf0eff9ca
SHA1c66239277572c35e6be9daa67a579ba37c083944
SHA25678eb724501ac6179a1013fdbddb879a3cd50e9de897f4fafb5373557bb75ec5c
SHA512d885e7d81d66191a7113153dbdb4a34aec228fee8d32a876d78b599d7d6ab5f9e9ab98816c8744f9671bfff7ae9a90af72f64d6b2514431efb51f6b483cc6e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770e6e8df88a7d31d03f37d6b132e86d
SHA1357f022d72a4bbea98b26570861550cf733a5521
SHA2565ff04c8e1777863024fe3a42a8e87aac33599be6a7baf7749cd0f2a4d480201a
SHA51285e5ea484622cd6fa9567fb0530a8f233d94b12b4fc0af136a1ca9ab217003cbe84db29b2dfb91a18fd17b4598fbd97481c4db02427bb57f6819d8e67beef384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d32fb28f0368f155e5bf0875ab4691f
SHA120a98de76720c6610d00c7de6614370afba627b5
SHA2560b765db3b40112d596222a009676ba0f013abef796b0a59c93e81efac97af916
SHA512cceffd4e007bb32eba6683b8fa0ed8e5f642722f882544b9297109837465294aac672bfd71f21a5020ba9277277bf7a5d05d4e1632a342d6ec801e5ba2420402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60d42cd19192d236a852e0cd9b7a1f5
SHA16a4e6422ad9d3e03057d6ce6e792f6a946e24743
SHA256f38fbcf942db199e5767ff365f316183ab9ee49671e214bba94de1a903f467ca
SHA5129f92ee6337f27a9e263358a6eefb170853f6ac8803c45062906261d6f2b27770d497b51550c17c13e283c2851029ee869b3aaa04eb4c81dbe8397fbdba594f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55149dac25b2bac4923e34df180584a
SHA1ce6a47110aaffc972cd7fbb5c2c954fb23440398
SHA256491725507eb707c41e78758fc033df26c0416328ba4fa3b8aa9c84b39a409804
SHA512205ec1a938357e3a4b5dc3e521f0415fcc2b0a80542bdd519bde1cebbeab8e0f323247d6e4dfeddbbb365f29831cb3097d6e02a4c32f6c5ef06e023e8a6febea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6b80b33370abfdceb3ce0faf20dfe4
SHA15d8bcb9230684b8a37cd97a2ccb5c47518e291dc
SHA25656feb303631d5ba75647c4a96a38a7889231a67b29ca7b08850c59f8ad5e2d94
SHA512dbb8894683d09d206588199be13a2143572de1b8bcf822d0ac93140e19bc6bc8daa368bcacc403618a6b88a68269decdd18d970c648de3741a0d1b48673c6e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b754b82bb3d1e83a94d8ebc08ac659a0
SHA1cd30c677f018f204b42598ab2f94708b1e9530c5
SHA2566fecf06e4b68a40ba25b62beb7a6c8eeef33dd5c346b7026b09a44ae402c1eee
SHA512e5656f98ed4426b9ee3f7c6e3ebbffbbe88d64e901d5e9f3fa0628f66c3f04284e8e1729fb8d29d2e5747961ba9ea7ab2fc02bee749562cbdb58fa2d0f69d80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4359b7464c2161f5326c48496e0eaea
SHA196582e0c93011bcbc879e0bda0c7452a236964da
SHA2562be46b2358f6060a9bbc2dc8beba594bd4bd8536c3b547f47b6b7144c327563f
SHA512bdfe8660b1e0212a93f349019bf7f9fdc26feeeb17877970ecb9b4528bd83f7af9b7ee98ce4071b5863dc75f8f1ffeaf458583c8c2a8bab227d67747b89dc690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcb66c1d17af91bc598492f0263bad1
SHA178042fdfd0723d2ec3c65016a56b48e6ec8126e0
SHA256a38840cf962a843e5bde9b1c74b8190e587662c70c103ff7a802c65ad20af7df
SHA51203f1ef5326dcd41305b64a0a7ba42a7fc8241507ed23126f755309a0e9d9954bfa716480c4fe403a31ece29b24ee94761ed4828519e054ecd6c03d5cfd36abe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f635a98f2d20377ce320cff4539ff49b
SHA1340846773e6ea29ddaf7f209512d44887fd07a8f
SHA256cbb4b73a9119181bea1004b2938a7e507a13a5f6810da521e5612a6c5afa71a0
SHA512c011f2feb8bea0210aa45e60875ba16e854c809f404630b6164dfe97106ce458c7cfcb99642872facde5e6e121c7fba3a29cf4b0dc694bcb91cbc4fd050d6ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d56db4b9e393413886ae41e1c4151dc
SHA14b770dc3c69733f153798aa9de59336a4e75fce2
SHA2564b10e66dd8d1458e53cecc8294f9e5caeb49a29630fcbe08ff8a46686e36fb9f
SHA51207c8be2bb05d05a24bdfba141a22e8661f43f752e8cc4e841636d6e1430745213004d198ff7790e0e09749d0d90fe112f10c5a3b237b201df81e05e938feac4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bbccaaf192f1876945dfbd18571713
SHA1b1b4dda8cd8d9dc123e14006bf65ae4bdb5270c4
SHA256550739f6a02dbff8a9d0be28078fa81519498f90c9f9a94091aff8857aaed38b
SHA5120300ab7df80666d1fb19fda38e135a767865ebb6e6a603623038b839929cb4e21e8ef5b887b6dd665ffb462537db95489fccfe180565ec624b67f99ff51e1108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56629e00dafe2f1334e43be174a9dfca8
SHA16909f65bf52f63370ceae8f4c1d0728828e620b3
SHA256d1f8a4ac539f2dc5b419455109ebab4c62a06b44cbb7f516001d04696ac146ef
SHA51227ab66a3999b303858262426d9b60b34fe6dd653a679daaab3c153d4ae3b9a71c5978f6413a4bac0cf8bab0b195021de5fb841cf83b3bedd952ee95e3aa95e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195192d7a4d6616d3c2745d0e9f9ce7a
SHA1d8cf0c48b565e82dad22ec6b0e59cdef1811c81f
SHA256b97fc6555a16239ddaadb3aa62315803d0aa12d6485929985b53c73e187727a9
SHA512ed3204d980160b80e163dee3abe351c84d168a866a6f275d57bada3aa9e0929b58eb6fbaf0bbc0216f773b5a88b9ed0d175488c47ce83a58f3fbb78945933c8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b