Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html
-
Size
160KB
-
MD5
24d233d873ccb7f0e458e430b5614673
-
SHA1
5896bdb57aef259a30a50727c3c45faae4a7e101
-
SHA256
ea0940dfb5694b6a7903690997408f0e7ee78888c87d1ec0b2d5d70a6f1e7a5e
-
SHA512
5c4322b46ddab01ec59dbe1d46625d2751fa5f4118e921130ff94693f30c179a129b1e0c521c9efed7fa3e2ff1e907581276f56131204b99492ba1317dd2d372
-
SSDEEP
1536:ieRT0Rh0IUq8R5LD9keRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iUbEeRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2920 svchost.exe 2368 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1156 IEXPLORE.EXE 2920 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000004ed7-476.dat upx behavioral1/memory/2920-483-0x00000000001C0000-0x00000000001CF000-memory.dmp upx behavioral1/memory/2920-482-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2368-493-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2368-491-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFDEE.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7993AD1-0D35-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421332905" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2368 DesktopLayer.exe 2368 DesktopLayer.exe 2368 DesktopLayer.exe 2368 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 2220 iexplore.exe 2220 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 1156 wrote to memory of 2920 1156 IEXPLORE.EXE 34 PID 1156 wrote to memory of 2920 1156 IEXPLORE.EXE 34 PID 1156 wrote to memory of 2920 1156 IEXPLORE.EXE 34 PID 1156 wrote to memory of 2920 1156 IEXPLORE.EXE 34 PID 2920 wrote to memory of 2368 2920 svchost.exe 35 PID 2920 wrote to memory of 2368 2920 svchost.exe 35 PID 2920 wrote to memory of 2368 2920 svchost.exe 35 PID 2920 wrote to memory of 2368 2920 svchost.exe 35 PID 2368 wrote to memory of 1604 2368 DesktopLayer.exe 36 PID 2368 wrote to memory of 1604 2368 DesktopLayer.exe 36 PID 2368 wrote to memory of 1604 2368 DesktopLayer.exe 36 PID 2368 wrote to memory of 1604 2368 DesktopLayer.exe 36 PID 2220 wrote to memory of 1544 2220 iexplore.exe 37 PID 2220 wrote to memory of 1544 2220 iexplore.exe 37 PID 2220 wrote to memory of 1544 2220 iexplore.exe 37 PID 2220 wrote to memory of 1544 2220 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1604
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:209939 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19e5c8d47a83017cc2b03fab4afa4be
SHA1ec90aee2a7bfd36de72f436156786ac7852f5055
SHA25666b77f837d6dd191ffc7e9a508e1f2facbfab59a4121aa7ef517e6b92d40f5dc
SHA512c1bbab08d133ff01f37f92b8c56443881b97a5375c9d430b33986155b8cf492367a3be4d323ffb17c1c8f6100473b97a479e0d5d868a4d0098bdc78efd27ef9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4eb918819ab81842f027f89504c066d
SHA11cd01f529404e32afa6e91d9787d1e6a43730c27
SHA256dbcb2d0c860422557d1925a39afd96c058691d190ce9c13df298f8c161ee22bb
SHA51279096aad91616daf14188ff88101d46e5c7d81fe806c05c69c4fe3b1e88b875c8a836c659c9e793c320806f1a210f75088897328f5dedd286cf107e09aea489b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d0551f4f442ef04448813854285925
SHA1c3abac3e4460ef2ed95827ba762981c92237162b
SHA256c545ddbf137d08c56184bc3ba911f01bac09e076ff532df5568b5945b7d9a464
SHA512a8a9f30dfd4fa56eee3011e549f99552ccf9a8813385c98741806a0f33b889180014139c369aceed820421f6724badce425d7ee4c6178712a4901d88f82627e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5856aa5aff90880cf5b9cca9e11bb1ae1
SHA1f311026d60ea6583018ad6592f00488122cdcca2
SHA256bc9b88e8c1bea49cd038b8f1f63f2a4c5cce244d9b119275b75362891cfdd9bb
SHA512a61560ac718888c7cc34c604b8405c59b371a83f11e71440d226320b0f0df1043e787caea917f3f1c34a15ee70a2530540a94e7e988526192118ad41afd1a762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c779e79dfc25f9ab363e770fd074728d
SHA1d6fc5290f1f1a167c9750017368cb1becfea925a
SHA2563f37b34993d6e75325b3d616a0bb64c1bb419dd3903596902d30058ce97ee300
SHA5126fe98a044d440ae3c3ae3156dc2d445adb8b9949b5474c64e0a5b95261072c22e36d0976c4ea215acd09802281ae88b912993779302aeda4584cf739f5175196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d9d26abe5ce87bce67c0d38c432db1
SHA18cf976afc3401a9d5ce8ce07d9e14bd5e096c0c3
SHA2567f959e54bf0e81848c0467cac1ce4b837286506927cbdc43903e232448d58fbf
SHA512dc485d6841bd09994e98a9f5e82dd93906a7f5c74cab094e15572b95e2c5066dcab858ff3e1d32e52489fed238b26f16172672bab4233335c47f291642fed062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51211e01530853786b6b6d44349f0daf2
SHA185fea6749b2cd31b894080655f2a68bc4b4ac6b0
SHA2563493454e6864b62cad771da10a40942c6d49b82804f507f29212de1d9064d0c0
SHA5129599ecbbf7cb1c3c36d31a17ed32b969c00feb4c4cdd7a26f7fd6e4d23603bc7bd96d6e8f692eb545e29371a0bb0abc72d149d80df9e035a0f9c19fdc48f78e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db244356d49ba5df48b5c63f771c7e2b
SHA10b9d4ed0687423fd86d4ed532f383312058a003e
SHA256283b43c3cb9780aa3cb51e01a5d7c95225b8acc604188f20075a92bf14b1ec55
SHA5122472dd9c717d0c60c3fde621ad514f7f6d8b339eb1ef4bf7c1eb45e7a39bcfe596c4865d183d4a588da3b6283d410f4521114b6df66a5e8d7afe3ccc808c13cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37a9264e6c475408cfdcd2ed8d6f5a4
SHA17acb17f4a7ae336066b64a48e8bd3dbe6c33cc99
SHA2569d1c43686bd688b098b3802948ce16e0e97f9cab3c1863bdd35788abe05a284a
SHA5128a8367f0819cb2fdb84dc317d244d21884b4d38c652919d81af491b0a2ec6bf601154fd79ca6e182072637302f7ae717314e90a62478ade4ae3ba7daa5fcccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92acc0355f4838638fc21532b9328a7
SHA19d44d843148da8b9498e711502e19f97a71e5974
SHA2564c11555d2d4f328420935a02c9f9b5bdb8cf99a06af4d6ee8c33c564915a0cab
SHA512f987fc460172bf5eb3fe7f51196fc4ec523de3384bb12e6cd2c167f1589afd4353ea6c1d3882e4a5d6d4802b8b95715f7ab38369fb740c334e1d85aa9a1053b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d1e630de5b514bdacf1537db9413ca
SHA1c84b4b9bd17d377294cbc6795e480a63a12adae5
SHA256c622eb8ccedda665d279a9103434c266df30fce33ad8fa023a6c435f8fb63459
SHA5121e51ec134853acbd09271e3cfac3b8f530381c36a030eac27258849bab03feb148d083cd29a30e01d402230d13b02aeff3a6e1263fb66d8da76039a6fe69fcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b53fa855c6515c24c4bedc9a2033849
SHA1ff2aefce04652dee331bbaa1bbd9e01695736320
SHA256efcb18de06a88b4dab0bb761e11cdbd6d1106d5aa7c171d1f3a19bd718edc1c5
SHA512247fbdde0ba91c05c5e6970d71c9cff655a13dd6d9504b2edf7f5960425ad8f10ef1b0c8de85b58139af62eb9976ae77382971af59da4a42e585d29cc9a25319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506b76f6597011f90dddb3b1521ed491
SHA1b4cd1600d7ab7ce3e8a259a643858e97908cc544
SHA2569e860a5d31cd84f0a430d55275b70fedd36198a6b37634e70366e9b40558c784
SHA5128905243d4fa1c3d37435dd5129a241851441095b71bd42a2676a0ed7a792cdf8a0da6b7305688377c12c4ec0d76ab868a518ec690f76946cf7beda7040bffd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592612854ee9e34b68bacac29e6ef9fa1
SHA12bee0b26e4fb17e72865dd143e00d94ef16d9ed7
SHA25662a6582049c2ed48d2a3bf626a0aec638d7fcd3a003814e62facedb4f705ad31
SHA51254998fd78e56f581a198dacb59bace960986265d39343f82b0dcde1507afbccedfb6fb22bd5bcf40e219e082f816d2f5b1b302315e5fcb57bdce475547b90d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533cac6e6043d7dced7fa680388d27fd9
SHA116b13c606ab8185e854ffb576a524303b9ea6ca5
SHA256ceeb1bd910c9e57cf46f15fbd02ff5b254b43bddaee30b42da54d7eb9538f38d
SHA512eeef628ce0123dc792f17ab5c12dc176ebf254010524308d5196a50eb4824e4f2c341d4aae118175737a523fbb58b0a83ba2733f8154b93ce63b2118325d46ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd85220d1e302206ffad1cd0638b919
SHA1afd9bd8f94f03e681ea3803ea644905f32752cc3
SHA256fe1ce516bbc761b3daab576a2758c9487b8cd31a16000ed3272e41066ef97abb
SHA5126fb338676a77b8c8229cd25df8d7ec7ae0670a842852def2bc31bd61648ec70469f0a397666a7b34f6944656729638659d732199c6e2251f941b3a396d550e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573cd806c629f512a965052d406d4d313
SHA1c493fa142dca7d82e7fb31c36c66dbf61a11aa46
SHA256820af0c129364d740d153ef4fdef8316e276776933057f19b4e3a91d027865de
SHA512c8f0029602667e56607b5b6de79ff27c37caba72c3d1589d655ddf3eeb40c394de44cd41a285e73ea93235dd5bb7abfd66249ae093bedb33997219528eb95d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58183c354e3332b1b2d0725a3577b3b7e
SHA1f5251ae33ebdae605250a4e42f6e758cd9cedff2
SHA25649ae60122cb4caeef1bb71eb53707b4bfd2e6a79285a24beffc705cd25b61ea6
SHA512b2bc9bd973bc10987809745dbc18896bb462ea574fe7206418dd8dc83b7d1964b40f6fb5d66daeb059087091e0759c0780da2bd8519524528e0c54f048b5c63b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a