Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
29ceb6e865f2e1207093491fefd8a5fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29ceb6e865f2e1207093491fefd8a5fc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29ceb6e865f2e1207093491fefd8a5fc_JaffaCakes118.html
-
Size
138KB
-
MD5
29ceb6e865f2e1207093491fefd8a5fc
-
SHA1
6b8176df996684ef8cd1e3d0ea7c2764b05cad1e
-
SHA256
12e74704dcddcb43fbc0671ab3c8eea55c19b6ecf8932802cd3bc5371932a284
-
SHA512
367423aad6e25aea25515d8a0f034ba3cf29f18d833613e0ec6f6e176735d3aff307c62142d14e92ec2ed2a93bf6c6efb93d774ff78e84730a47335c26e4ae6c
-
SSDEEP
1536:SgDfsRZf8qGhrqArLCl9NyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SguNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000796e725316ce0fae01280179d65e147d19be05f266dcebf7493405705f0d008a000000000e8000000002000020000000cdae2a26d287d2961f7ebd8884f9263ad4f99faf4b69f5de88eaa1e99a8a54c220000000750718798423733e06f57a88b52f2e38b1da17010a85b5acd3d1ad6c3a1bc8e240000000879909ee5d7b7e5930b49458e69d9bb94173cd64b2ceece43a7c497850b2ec49d5c2682f6a614f53fdcbc64448156cf8cb7b1c3c7f0d8e05cf8c7f0342f22bd4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b031c517401adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434635774" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007d28e8c9de69277d358f5467e9aa063aa21897c899854555e56345c469a09b56000000000e8000000002000020000000dabc31d124ee5a221fbb33d180a28b3c2ec67f30bdbb7a37a176933c23b8bc3390000000ca6d40a97459a255ee1fc218f52a335b741f885f255d25540ea27be4ec54e6e8989ba94b55542966627c896b6bde9b8a37fdb017155672afe303df84a42b78e615edee6f33d83b004e91433204a2d82cfc220e745ac364b9220f2bc8483977e50779ec3e586e45bb5f03fdcbf95f22fc06bb3c247c7c65442b8646e98c2e9efacc0d3b7ec1a5424043ed780e9e28214740000000d7b76588913c1f1eed58f4807835468f2e440506ea8169b69144ba8eabaffcfa352e823fa66176280a96cda853cf8d985d2c9665fc088ecc6cea38e08171a485 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFFE4F31-8632-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29ceb6e865f2e1207093491fefd8a5fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53653d8fc26463b22db048ecc0561745b
SHA1357d2173fb8f3e5b1b785f14fe4df3a8754a0587
SHA256c824ff04e2a5ac2e67267c59fb3f5d0e1e7d1d70396de017f46c7e3c480abcae
SHA5121f155dba58dbf1d407fa72dcf4b5334841b8d30c23311307098d9c105902d2e5b283cdd904c745dfd167c16d637f17d3d783c97ce93031d9ca5e0870729e2fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574337168c4f622c08f20d9d161b77e41
SHA13eb12804d94f2af8f9c62d826b0322ea2441a8f5
SHA256301802feaf5510ce5c7a47b7c000e93d6334811ae7a45386d5f4a6f232bd8b03
SHA512420d2664deed7846009894fa5bde2fd2092df4cfe2c9d4099605fbdcbd577e8fb9763195810d6edeb04bcf50dfc5f2b6f51940e66d62a76ded98cb3f00a8f59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a06eba2cc0e1a4e20e98f54a44abb4
SHA1a53d94a4648809439965238556900f7375f8eb01
SHA256927d0b0e296ba398a498c53e29dd8446cf4d4ca4169c56d9ab9387f2cb293ae9
SHA5127c5044875c9846d56069ace84831fd16166533082e93d7769d5070cb870428ef991f9e6329a415ecda16ed25026540c0461e7b26b93abc9e4723e5c308794de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c43d3515ed5d1259a463fe8cd21397
SHA10a49458662052cd7ac197cafe7b9ca996fb4fdba
SHA256c254d5209b1ada54132469b579f47c35208dc25f0ff0b2f25f80045ec8db80ed
SHA512f0c631b32816ab0861c68df8a605adaec03135ee4e295aaf82b881e319706569e097a8ce778b0dfc375e2799069547f7ba3769ab9297782cff7ed22e2cd54c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796072016951ade56b50eef4539d5990
SHA1605467e3742fb41f628d4b79d53475293df33a80
SHA25676cc8f2ea917f63fe54f8713c716d2611db826373830bc642f4a9ec146cea88a
SHA5121ae5d3ec9865fe0920e92fd81c72a8f11396dcf0c7ec835d9ed8a3bec7ee3b2d70f28c302cf5a98122ab690b0bfee29fc06e2b417272c5dd2012eb49aec046e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4ebd4eeb9c256b1408f10049f9a41a
SHA13819d0fa74ee15c061af4f8e97a97c89672c0a44
SHA256d54ae15e4f6ef010afeafad9a686ff17416bcba3d99e4d9e3936056727e600ff
SHA5121609aae105c2ccef3d5cd48daa40b4db4cdd81e33a0c9cf910895d19b933394c32153812195411a557aae339984383c5e7bf76c92fbb307f380a2bca4f7570f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7865648dc0d464d4c033ad06d9ee07f
SHA1704085965164487099c402c58f56325b2028d178
SHA2564ba13caa0451c0a8dbd8f348efc5f49b6ec3eed3aee50ba20dea5e092dee3d14
SHA512a895520ceda6b6e6cc27353e62b887fca86e7338ca089dda271fd8e219d3da709c2821ff8d452cb206b40f62dccc7a30b424f3ecc4c486dd733d8dca79589a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b041426c929ae55c88e36d54de9912
SHA15141ef7302f2b0d0d59406a26ab8600d065c9566
SHA256be68549e348a7832179cecb7ed4cb535126e59ce99277657094e0af6be35e12d
SHA512f34519035c2ab25b0eefa44aef8be8566d5e77a2240ed75c92b792877e1bee11fbd03fd5d9211421a7b0559d197bec4ba9c30e900f70e5270e2508e756095acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbc67ce03521f253a8b223c0290f3d4
SHA1a8e6794b13e908ad3d44b13ecf5a921c0bb12a9c
SHA2560e23d5cfd0be8af8d40bb19bbc9b6bec22590df1b38602b3d86753a5435d175b
SHA512accb2bce681c927ff9a73de2dc8223fd4ac0ef84818d0ff01364d5142385c1cc627a64b1b8e2034a39f744e81f560dc1cf29fed766a76ebf7b3af48bc76a84ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51495c9885ddd6f4b3e4950ef109322b7
SHA1da692996608103e9d6aba2c4f244adedaaba96d7
SHA256916bc352f9f143151301ad59a19267f513aa1d052fc1fe74c730926314f1d870
SHA5122ea8f27130a485ba56922a0af2f60e5cab9f1b5c37c5ed718625a207ffb9eb673f0226b886c6b12f0de702f97b52d0ec2b65fd6018d2a2afb60bb217acc66422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e6cfaf8056ce20514dd458e36dd6e1
SHA1360a623dc3f06083bbb12333ed9a709862f4c542
SHA2563033faddb2c29de7b16929f35daba4c7db7782addad35dd704d3ff3b0f1d089d
SHA5126d3ad3d9f31853ed0cbddf9de52c8ea00c841b49313a951ae7fdd7fec2e4efc277345a23220f5e778f1fd2e78911519da907f2fbec0318c0e56444a650e73368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c1240c9dcc3f2af432d1d18452f20d
SHA1abcd366f925f2c6c3934d0fda4f9cb26e36a2fc1
SHA256776d1b8beb05532bfb1712a764ad641c4dd8d8ade54e6b6221bd9e1ab601d6dd
SHA5128b316a27511846ec4532dd15ffced5f8d0fcd492faaa07652991b524f02c4f8c7ec30af7c91dc902ab6b4781c565750ec3da7f6ca411c7020df22489f2190391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0802318bcf8ed924c616cd690258edb
SHA1f9315d62b8a3e2491d3870397f4a218c8d757929
SHA2561581c202d0bbc2d43e0768327e3bd4bcfbbb4d447ec2dd2846a99f52774c2bf5
SHA5121ea9d90a344d31ab10b1e93a16308192bbf4bfa44ce3f226e85a5a61b23aef4350e180bfa69da6133d53b05a2f04e20f06923694d6ccdb0aec39bef822a16256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d4231c5d95b2698e955a22ba66c61a
SHA1e6a20d3e71e45894b6068fad9bee669ee0d6682d
SHA2564ac36cb72e296b591fb5364170365d4fdf949eb7e7f878c95698603ad9e66999
SHA512103728092638ab85009dda1b4016bea81a7397d8b8ec1d194dc3ff44bf325b19a9c532a4bbf4383e3927f7604f3e01f8307500eacbd7e63b12748cb2d95ba465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e80824c5c79194221574db2b93f682e
SHA1f50dada96057ba6f2b42f90e937dac7264cd46fe
SHA2565e677eeadd8c3ba17823bb7fd025f5e1e0f40da42de1839d186374a10c448c57
SHA512c8246d7d8a3fb4f61ab7fa763902e70c70a8ea7088ef51121a10cc6a7edc6ac31c7b79ea1b25b869843c4726e3fe999d9f2e5abafb6fdeb164b80ffeb72793c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e86b3f59f7b56bf86a48373b5bfe93c
SHA16a538bbd685a93cdd6025391042afcde6e5f6ed7
SHA256334404bff13ad0b54b2960de943c0ee3ed4aa0773b82a84dde21ab5f5b12d486
SHA512592d322b18b762c21a4617688303cbd3a1135270219f83ca263390ca0ca19c9caad3762c185c8ecb246e813ec3741be45bec910968c1435a6ce25d05f60b934b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a56d24d75b6baa4de5bc1fc03e92ac
SHA1cb47301c9d62812ae3412fc94f583add99662585
SHA256e471eed6fe3f7abdf1f0a5562fdf15b72b75d778c8f93d5efba346b5822a5e76
SHA5127804c4adeac677dc7939b0644a6bdecc8eef536ba6a20eb03f2efbcc3dfb700bba8de1247cbdb26882ee07c36ac60687c94479b7ae16cf64766109bc0b6f0c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587773eebef036ccd114d64d2a5b44fd8
SHA11490f45a74c6975c83ade3eb0ec7cdc6b7ce3bb0
SHA25674f9ce2f189275975e49d656229fa770ae2ad2bba807ca505d4c377c98a23bcb
SHA512bb5315d2c8242a5b2a140cb3579aa8fa186a9c7366b5dac747fdb1a4c77f57651e912fa0b6329d29e0118437433bbdfeeaa31232bbf7502834b6c3cad2018ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057c5447d9793b681256bf9069844387
SHA1e4f9e00348f251bfa931d083b80fe043a353c47d
SHA256589c48f99d07f323c73f0bbd58f8572a6d2f954ebd81cfd6309dfb01f111260c
SHA512a184dd55f5aa458c9175f1fbceef9beb2892247eadfb31c684e33e30c23dc83516ba80c20bc8f933ce3d4b9b92ba7f9950c28f86f4b1851be1e4b91d1c6ca0c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b