Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
5b404c30b96d480829df62a76a2606fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b404c30b96d480829df62a76a2606fb_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
5b404c30b96d480829df62a76a2606fb_JaffaCakes118.html
-
Size
157KB
-
MD5
5b404c30b96d480829df62a76a2606fb
-
SHA1
345d197dbbdc7e9fdffca365f9e12257a118e38c
-
SHA256
d85842e7347ae799d40928bd2d7e3ed78f8322b3005ec0289a5309287dfa8ee3
-
SHA512
2ceb428b872d39ea6a8382b4f50e32cf478272d2023ea3dcb481ee9e523c710a022dfd30094056392ce43da33429dbe217d2b16cdde1f42b8c33dd62a9754b27
-
SSDEEP
1536:ieRT+Za5UYVw7IKA2e8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:iUrmko1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2600 svchost.exe 2924 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 IEXPLORE.EXE 2600 svchost.exe -
resource yara_rule behavioral1/files/0x002b000000004ed7-476.dat upx behavioral1/memory/2600-482-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2924-489-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2924-492-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2924-494-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF518.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422311424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22601BD1-161C-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2924 DesktopLayer.exe 2924 DesktopLayer.exe 2924 DesktopLayer.exe 2924 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 1924 iexplore.exe 1924 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 2332 wrote to memory of 2600 2332 IEXPLORE.EXE 34 PID 2332 wrote to memory of 2600 2332 IEXPLORE.EXE 34 PID 2332 wrote to memory of 2600 2332 IEXPLORE.EXE 34 PID 2332 wrote to memory of 2600 2332 IEXPLORE.EXE 34 PID 2600 wrote to memory of 2924 2600 svchost.exe 35 PID 2600 wrote to memory of 2924 2600 svchost.exe 35 PID 2600 wrote to memory of 2924 2600 svchost.exe 35 PID 2600 wrote to memory of 2924 2600 svchost.exe 35 PID 2924 wrote to memory of 2804 2924 DesktopLayer.exe 36 PID 2924 wrote to memory of 2804 2924 DesktopLayer.exe 36 PID 2924 wrote to memory of 2804 2924 DesktopLayer.exe 36 PID 2924 wrote to memory of 2804 2924 DesktopLayer.exe 36 PID 1924 wrote to memory of 1496 1924 iexplore.exe 37 PID 1924 wrote to memory of 1496 1924 iexplore.exe 37 PID 1924 wrote to memory of 1496 1924 iexplore.exe 37 PID 1924 wrote to memory of 1496 1924 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b404c30b96d480829df62a76a2606fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2804
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:209939 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7ce7f010df7afcfb7a5cf7f78c0b68
SHA1eeabbc28c4d9801ebb3b73790e46dfed3e420622
SHA256d16a63591ef45448afab98e42ec56ee4bdcc1c267d7beb87d7d331fbb3e1abaa
SHA5128d3a00e2d7e46a070cf34ae4d65016192c15a217bc86a42108b9291e63d20252a63252c9c35407aa049c0d27e9d3ef3d7ed64ce90ecc008ee1cfb1921b2fc9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7f906487745c465426abf3ae90d29b
SHA113be8ad9196ef119d0283b0d147ff7304f1b02c7
SHA2562ad9ea1af24da6f7effcdd201185c402ed7e465e50a0b7261b7fb3de305cf222
SHA512f3055d3c3cfaf6161fc5acf6b7ba6e489574ecf7417f45e60ae6d6d2d26f9cb1a81e462088e07d526f944dda7843ab3058fe8de369212755908c232bb483c9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d726026a05077894e196a77029d2cc51
SHA1ff7d2b24082e944f2eb4cfbf14f2e2271f1c8c77
SHA256dae464dfa7f7737a83847d3b7a3de5e7da58ac56da3f7cc603d3c73af21092cd
SHA51265c5d712274ef34a3bad205c5e0c744f0461c28d03c925965d662963a8c95ccb05ad7b30393d6a600c63426f38fdb8f40c4aaf69e49da092e53bce087050b998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d251ea4298c3b32821f5d7184bbe19a
SHA12c0795d7403b203e51cebb407ff53829152fed18
SHA256d533f2f3bb310011b4684b3a84c4c72b67b49a25d0fad6aba7cc58963e9438bb
SHA512d28287a8fa78c886a01063bab748e020c446eda4f4990480c933d7f31966938a2f017bc7425ec7a32a66ec4f175fb87e1230090ade7bfabdbb3bc74b9d8297ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d67cbd1047d18dfdb907e68f8feca9
SHA1c434705f94634352fb94a00706140cb99bbf2110
SHA256a71740b64271545bb9f716565a11e89a235fff844ee55bc0b9c26157be8bc7cc
SHA51263bd9ce7fa83643df7e1745646dfcc7632cd9a1b36dec62ba074c03f1d4e47122a255cda1a5ed9959be8144875e09a1c3a7449c4d61ee5234d005c07d826d310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53da03e41b026c1b13c270200c770a36d
SHA190a721d82ef5c6452ca1af90a83d1a4b57f984bc
SHA256928e81c419917515c981e08264722ea9bbdeda857e657d0a9e952901cff841fd
SHA5126fce2e81119c0d08d3e176ccf4956e045f2e5f64ba1a0da012fcfb340622d539a131179a8439fa61b556880e63b00fa1de72ac86112dc7171cba7333f6f29eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eed4b2a28ff3a656e68f7fc717649f4
SHA1f6a36040b3082b231210fe4a2a135a7583bd1203
SHA2560d0e0961d1f59b331d82767d132f3b721fd1f5ab0b2f9df61a11043560584480
SHA512551c87195e442cf372cc7fb26dec5d63fcc0d86de7ab58418801ed469a921d662382e20abe96dff928f32c97e1799aa6598131e288c8ef24953b15b4058c6917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45adecd44e9363ce0e00a1010e4b96f
SHA1a132ebde21fb10306f33f39e8d41da1d31023c72
SHA2562254f6f855b90a2a874cca484b01822750b78d315c8656438297d24c92c9469d
SHA512a6805ea67e98e6c67f03d75456326d198477abdbde846b6622f187a611e54feadcffa4a96750d939a25377e2c74a07c35bdd0436d45c21391a107260cd856495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ab8aeacebcc363b5a68d741dbff5a1
SHA182636787952edc5b3ec05d8c15db000a8fccf43c
SHA25694bc86dec535b41fef0053a589ce073887913ca37ba8a6f7144e8c1265aabf22
SHA5129d34345bff4a85848338225cb5a3245e977c56ea574eda4ac14d53c3afdde5db1708ebf49935302d6f2ecfc83384548a0c8144730d725857ce6ab4cec511f2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba156c5c756097ea792ce8c276186a50
SHA183c12842996e62f21519114960192587374b9789
SHA256cf52ff4bc010c65c455cbea6278dcb1cbbf4338018878ee233974c174c528d9f
SHA512136a6cd8d1ec05621c9d6265daa46f5a6506515bae0c304bedb7b9d3091b17b1e6612d3a77f104f607a77af8cd62df904685bc4e860b9049b0ca9381430642f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c7ca84050c4346fc229c023144d4e8
SHA1264f14e4d2ec05db36a6837d886e839e2ead0030
SHA256f81a7d59a721a5cfd9f0250cbbc0fba96081ff5740d8f39f002eb1fa7e1d3171
SHA51205a645cd6c5c0ce4415a6de4d4e88d205b6304c969942d5c2ba4ca76cde44fb7f1d276f5bbf8d67e4bf36f81c989089e63994b6e9de677036a3039f7ea30caef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31268a769b35a0bbb83d2645393f642
SHA133002389038f43ea361266c196f35bd4557fa198
SHA256e902b4ebf19f160bea87b0967319f76bab348b6d9259693b202721e245202004
SHA512699e636dd92a5562c18ee4a1f1baebbd0e7d30758d509c0d4600c3191393a27c22195dc344602e85f72dfe83a3090838b460f2abff47b0156820cceb6430de83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c7a871d10b554cf3b912e1371b240c
SHA128a831ea84ad8dfebe18cc53eeeca0bff7b3b988
SHA2565e0e832a3f5966853eaab5f897e5093ab4de24e2a62e6350112a0bd4051a9ffb
SHA512c7e20650b1358edd40b73837e5ad2c53ff38a17be010c66e983c62a5a4960b6223f77d444702235ec84082e45da0575799ec6b2a777304b4f5c38ec80748760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac879915a682b5cd30d750a15889e0b
SHA16840beb731af776900eab37315e7a6945afff535
SHA256e250c2a3f1c278119e00fa3de7fec494a938ae2829213f16b2fffef4a3a32a12
SHA5129140afc1bffe22b3a5633bb469a4b0604805f3f9cf9878c3937fc82b6abf93a155529e2ecb2a8ab91e2e8aa21e509687fa2f073e28ef6f7956135a34ec87f578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de01c730ad6a411c79832b2893f1061
SHA151aca1960c3f43788185d1250bd202c95793fb00
SHA256f60d8ba549f69990433d70df9626407e30214508b676805514bdb9f134511924
SHA512fa8eb13d2357f6162c1c084a400ff3d57f0035e8a4bc2216acc3216c1ac1301d45144c1b054d34097792bce9250ff9d3551275eb9b4853cf7562607473da2180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58827a086caf38133a6b779d0719e3600
SHA164afab60ad7d63acc932f3148492bd6ad12b14d6
SHA256ec5bc8fa7d4f7ce6e15d5a3453e445c53c4d0b7c5b411cfefc387295409bf97e
SHA5121bd52c098d0a7e6e57d87c96bf2efd5fd5cfb3cfadc1a8047025fc3e582d181370183b0bfa39d6b835c781d9bba08b79a92b453d67382009381492b1c561f56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574baba38a8d917702d8ae90bff3d12df
SHA14c5b51a6ad197fc1fd0d2ce9cb103cc1ec771de2
SHA256c7e563a3e0442146ad2afd6a2b07770ba50804da7a79feddb0fbaa3e7ee74480
SHA5123ab3171431ebadf6c80fcb30422e71cfa329f5662fbc4fd7ac5e23de5c1753c1cdb3a1cd685da3ccfaf105d61956eb43e5bce784e42320fc0ca6ff0a68d4750f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a8de2eda23996fbf809d87c04f2e87
SHA1e7c99d82b898a542cd98c5ad46bcfffbf85e510a
SHA256a6a2b59db3fb39f4955d10091d7ea4483b5afc0322cd3c9ebde9a9aed92ed248
SHA512ffad88c173d7e3fa0920b625379857cf0cea742937c9afabec7189e6730d99d1c93713bd8e9a0e3c7063760aa7610417832d9918f60ec297f3218ad31a75001b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e3c05e1a6a6ce60e7359cd86de37f5
SHA110149e4f20bb50177341f65b8b2027e7ff0e2558
SHA256dd90bd523bfe322fb264cc20d3a6bf7908ef85cadcbee498dd5da5a03142d0cf
SHA5128a8613b9e1972e94c5e636f462bb5ad433ea8db523eff7d0d8317f4c18c873f26d17134ea19e19a379a7e3746df5b37c40d061d0142ecfb0bf18fd10b20ec47f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a