Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
5477ab0f5b89bb0859ec62bb73e797d5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5477ab0f5b89bb0859ec62bb73e797d5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5477ab0f5b89bb0859ec62bb73e797d5_JaffaCakes118.html
-
Size
17KB
-
MD5
5477ab0f5b89bb0859ec62bb73e797d5
-
SHA1
a796290d2febb15349cda5acc0b816d52de9b9a8
-
SHA256
924274f59a2cebb11e8dd3297072f11ef6c9ad837fecd2638067bce974bbaf87
-
SHA512
148901a138c9733cb4cd213e4fe54aa2245600ba3af4338847c981c658437761e3235115d4115760b5b2e0a36bbe7e83832792f3c18f6dbece83ea61833eaeda
-
SSDEEP
384:wLbvg+r2nhDMJPstEAhWDA4zT6rXIFWhx7NLcWYRK:6bF2T1WcrIQlLcWuK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400035d9f420db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435373183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9FF7631-8CE7-11EF-9DE0-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000074765b593fabab915ba559a9a20b9e50434c0b9415c15e32efb6d98d3db81a71000000000e80000000020000200000002faef2447c58e921324cad95ca3495fc7fe2e5522e65d5eaaf08ab6370163e2220000000ada54d557b84a64492e88f90780781fa70343a0ba48ab67ac11d4580d13283e1400000009e3d4860719d3a45fea890e77bb212e8c26bc2a0d56304031951ed9b2ad3f9c56d27288cc7ea61debb489499357b07442e97834e67a24fc0c6b086cd65976ce6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000b9d9541e6231a2a443a08d27ae0da06d180dfdf26d307cebafa0ec88cfaeeb40000000000e80000000020000200000008b67d1e9b117bd857295c7c12c313e15b6ad4605eb3f74175f0fe00e8fa85a6b9000000030c89f7e7da5c9a65aceb937d5801ed787d2964212c85aa4060a2b9f07ba1ae999a8003fe0631c7e496ba4f1e6d4899b7d9628b630f187b819606f9a801a4e4aee06983bbf31522b74816949228b2966ab1cc51dea5ab2de012719d2952a4b8dcced592a44df827bcdcdf64737cc458dcf81280beb67d2cc5cf24155d983c8a8683fb4f4b3981c6ba09e392b1497196540000000adf7517a01e27547b184972057fc5872b4c927a210b6f84d898cdecaf82639ff57dc896aadc2c24a8e694c2b8826e009e929cdd302331b8b2d2cd0eaf4880628 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5477ab0f5b89bb0859ec62bb73e797d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538223f01e4080b362fc5024942907031
SHA13130d1cc1730ef5db90a690b1f3f8ef0ec738ed9
SHA256973c04975d9881d19992b34e2ca18dbf32f79d015a34ad41909962c4fb059166
SHA512bf244700ce619692e438cb5889a7fa4c7859e47d0c5ff8dbe59102c1462b54b5313a1a0ac7adc0b051fb9801a5c2a9ed0e40da6693c1dce1df6a7545669a95a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227b42b23e0bfaedd1bde545606b7208
SHA10a8f70e83f3eae9339d203c670a2c07ec1dcc1fe
SHA256877d4a9c6b6cb3ce788f1aed179a38e443d9b9c9015922faf37f2895c834534f
SHA5120eb1e934a0bf9d4b71d021d9e7a8a298464d80c01c1f3e13b42d9c1109c434206f2189480fde048d199e405de10b30a087ce53fd9193df8ae014bad6cb0a0c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5da8c0a34f222b34fa4ef5046e5123
SHA15c55653f9e4969534acdc24c10934677a662613d
SHA256267d20938c98a6f088695e29b74b5751d9bf3d71c59325f0a3b76136a3787b5e
SHA512785d5b2d0fdb385cb56fe7ffd93346eca873c053e1806e3cffd169003b1e3fb18e3567fab3b6fbfe3bf3006e24d8b5ed1286d6b1ed301e067c80bf91de4f5139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dbfbcc27fe7d899a935f4779f9fc29
SHA16954a355e27ddc6984e2144ccf694192530fd945
SHA256cfec2d7bfc0b5c133ce4f2d65f85a062d7aea9b973652d4f21ff708b89307d35
SHA5125997359fdd2b0ec54ab33a00a084edf5314ec6e88ad7a217a0f1db2104b271956b7542156d2403a1fab22ec8fe4f13fb699cec77f73eb09ddc91e06ccfeec871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0c50eabbd26011c7102a16c8f960cd
SHA17f3ef33d724da8fca66b8a74253ed968413f6b75
SHA25637951e8112a9ca8fde88c0163f95956572cfc3ff9a8095a5697212766f7bdd67
SHA512170deac87a07621338136b56e1fe7141972aa907288fe99bb87704b3b35acb861bd1e1dd40f640bba7749253efdda848a372dc14a076bb485d0d11d6e313e8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579e0c13daf2589afcc17a1f34a3b0c1
SHA1da350e65d59f0d0a67ab503deb83ef970400171c
SHA256ac22db4ab918c6c55ddc28cdf2c31b6094c9470ea98b0862a2135f253b88aa8c
SHA512ad233ec8310774bf37787da5b0d993f20f73db0a78e17ef118b525f9dbce6c3fa66adc62b1287e8f7592865e1eace497ef1f1b0922d43aabf6b7792ded571eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59daadd61b2eda2b04f995fe385b52206
SHA1a2de2e25a161659cf485fb7950b241f7e4d1b32c
SHA2566489f776028fc80608a8a126a1521d4b73476332720c6b8f7d8cf62203006295
SHA51238a0ffc9fe3cd2a8c0cc7a5fec5021536da1a420a7a6f84668a716dcc0890992c3662feb6746e8c730d6373907b1ee7e20225dfe186a7bf686cde7d016e43bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867c0cddede290f2d5e6eeff53eeb72a
SHA10d6eb7dc0be9fedc59e995b4ecec3ed5d021140a
SHA256b0818554e0d7e575b7a4fa78c080f46589aa0fc461be29b57499eed9fc58467b
SHA512fe118e348002b029abbb6300a93ef06078adda0c360f6f4cd71135d1b5664f1d9d2245e5a291acb70ac0b7371f8b0d8653aefaf3a7de575140303504b5da0af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f03a9229f3f1b5525e6b005d54d776
SHA179d37841d29f7eb281a01e559cd8b691bb8eff91
SHA25661390f038b0ba53cf22962a6e893e6bdd1ae96051a86842de8a473782b849f78
SHA512b76ed6c33b0986f60b1054c8c6088aaf2e90bfd6ff47fe74f6ca55baa0fa43facc35de82b75a97bb242dbc9bae29546f92fbfadf15ab7c82eac82227945f6ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20aa08ab2f6b37b7d5845ba0811800e
SHA1330141c9cbea2cc00916de309cadafd83dce4490
SHA256ac353cff66fe427ca919fc93a490a72b96c00a7ea7294d75fe226066d941d4ea
SHA512e5bebbe99e430d290c421e5cb6488d5235ecf2d9822fd34ffc1f5ae21e77ef975a7c6bde858704cac2d547952ceff36784a224f8d0818f2f15be9f377178dc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be8a9bd775dba49c572214d5639dbe6
SHA148e3d0bcbf7fbd03f56ebb432f0b66cb1d7a60af
SHA25606c9308534ae7668170acee0a509ac27f7ce1bd4794d060711a93bde1e642a12
SHA5128b11f65128a4edabe3e31d018a70d202e5b155e471a75bc3ba858cf313ef77a250203b6b71f6b4f70f3ef53d42b7716770fd51d271eaa94be11eb83351f8f2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578075ffcb545efc7f150f7f61757146b
SHA1cdba3f350b8763a515ff51b42a6667c6e2f045eb
SHA2561626eb3c9973beb5869eef08dbd87f5f1ceffc045a478b39a89e610189471f11
SHA512aa7f566866e6656fb4bc3e9a5d30b47f4b9d47b7f2a3b78a8b7ac20509ace6aecb0168364792598108243ef2d044b91f36770e7e353cb45fa3f01c8f5a2ab781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe5b79b1a51b2c289a4987e20041946
SHA1978bd43bd9470a32f0f2ee3f8f00744ef891e055
SHA256675ba25a3305f3f5cbc49c3ac877000a6fe4377e72905ed1623ca2017bc9aa96
SHA51265673d5eb19ce84f4b63cc5679679893ed04656d90a33a63b3d31102005cc8d92a399107037340fd01b2d77e5901dc20f44b04b532de8f8a24f12e7bbc31c388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a288ba9f3dacafb44c400501f785434c
SHA156cca8433d87a082340ee9235c5ab0ed01aec253
SHA2563d4c6145c99d7638b9593fddb30a65916875e9b395f26e9d7d34a58dd6c0d53e
SHA5121e5a8a4eaeeec4af610b9197960cc31d19d6ff52fabf695e9c17cba51bad8ff3dffb266d518fb8fca1420763fbc03011800a885606a21116ab798728b91be2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5f7f22cf711726f1f06b622a0d57bb
SHA1d75ba5e82d051c3c440736ed4cbf84b00b761e17
SHA256538b30734ec5ec55fe878b92176621abae88615def5e3a565c4132e9529e3688
SHA51206a609d6dacf5f070150b9300a02308ea8301bc0d07ccaa21ac90c75f74ba92f1ba7f0bbe3ee1a8a3e8f6acf3262e6e103e50d259cfa8012d6980df255f9fefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71e47c9ff9f1c1a5ce5e60fb424ddb2
SHA198f92e33743f9ecd286f0ed9725620ba7e2209e4
SHA256c2a715e7f5e0107604027115090b5aa3efd47596323efdcea279da8f7593b929
SHA512c8c4f5e1af3593c74af7aacc41c324b047c5c96441026d4f8c3f5212c4cfde046d76429310d9601b2f54161d7664f8a1447acb217905396ed444a37c5e7ef7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ed2f1627e3bd0bc9bdbd9c0d2effe7
SHA1a0a01705e6539fcb51cb78f270ff0682edaec6e7
SHA256db24f734c4974f23b3863fdfe3ad96cace874c95ee0696e29659c0e9a89912df
SHA5128decaa5755a470fbb60421773ef5a6cba6367128abbcc9ce1fab77fe8eb50b3f6e6e3c93fd863fb4811f0f499eb5a55e4dfbf92d267466c2de08d8d412b4d9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dec3e55e953d6fcc04d203c57544f14
SHA16990fc9918f1f8538570b976964d8ab42e894a34
SHA256181c4bd35f8b75172d7a527cec51581f998ca0117d2aaf02adff6d8a7121599a
SHA512a1877e277cd1b5e1e1da51af272cf40b0d4f5e70d74495659646eccae78e65d673956a0df0886d323152e78451eb9adae3915710c4e5ee4b11d5550ecfeaf466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064732819ef28bf192a689c8efc9032e
SHA1767d7f91ff0d9a1ff005ae09faddb06d169478f2
SHA2562b4612b945606eaf70eddfaa8b45c44642202a6a2d6e550e1aa2d76b3e66ca6e
SHA512b705d4a069d937056ab5f4bdea1673fbc0005990222e4084ba1b2ecf24dad5d59c54768fe2fe6d371d3900a8de166bbe96a8ccb24b7746d8e63e0eeca8e6a118
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b