Analysis
-
max time kernel
130s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
7320ca134950fb56ac3330e193f95198_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7320ca134950fb56ac3330e193f95198_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7320ca134950fb56ac3330e193f95198_JaffaCakes118.html
-
Size
158KB
-
MD5
7320ca134950fb56ac3330e193f95198
-
SHA1
2eb64159074b90043818387bb163b0bd609d4601
-
SHA256
07ba329ab846789845e1024303d162c3d757625727b759d615ad6e6842293bfa
-
SHA512
38999bc469924a55c42e803b2a242a62bdd504276af1272149ebc55a024cb976de181359b9187504f7cc8738fe60c0e1914a21e6ed4edcc410e87654ccfb8dbb
-
SSDEEP
3072:ilwJi8Gg6iyfkMY+BES09JXAnyrZalI+YQ:i6JTGg6nsMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2932 svchost.exe 1668 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 IEXPLORE.EXE 2932 svchost.exe -
resource yara_rule behavioral1/memory/1668-491-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1668-492-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000b000000014c2d-489.dat upx behavioral1/memory/2932-482-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxEFFA.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422830233" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14A56FB1-1AD4-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1668 DesktopLayer.exe 1668 DesktopLayer.exe 1668 DesktopLayer.exe 1668 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2240 iexplore.exe 2240 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2212 2240 iexplore.exe 28 PID 2240 wrote to memory of 2212 2240 iexplore.exe 28 PID 2240 wrote to memory of 2212 2240 iexplore.exe 28 PID 2240 wrote to memory of 2212 2240 iexplore.exe 28 PID 2212 wrote to memory of 2932 2212 IEXPLORE.EXE 34 PID 2212 wrote to memory of 2932 2212 IEXPLORE.EXE 34 PID 2212 wrote to memory of 2932 2212 IEXPLORE.EXE 34 PID 2212 wrote to memory of 2932 2212 IEXPLORE.EXE 34 PID 2932 wrote to memory of 1668 2932 svchost.exe 35 PID 2932 wrote to memory of 1668 2932 svchost.exe 35 PID 2932 wrote to memory of 1668 2932 svchost.exe 35 PID 2932 wrote to memory of 1668 2932 svchost.exe 35 PID 1668 wrote to memory of 1656 1668 DesktopLayer.exe 36 PID 1668 wrote to memory of 1656 1668 DesktopLayer.exe 36 PID 1668 wrote to memory of 1656 1668 DesktopLayer.exe 36 PID 1668 wrote to memory of 1656 1668 DesktopLayer.exe 36 PID 2240 wrote to memory of 2844 2240 iexplore.exe 37 PID 2240 wrote to memory of 2844 2240 iexplore.exe 37 PID 2240 wrote to memory of 2844 2240 iexplore.exe 37 PID 2240 wrote to memory of 2844 2240 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7320ca134950fb56ac3330e193f95198_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1656
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:406539 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ac3ca29e5bff3823bb83dadeb331a5
SHA1ca7c1c11eeae76318927c9db69909433bf141d22
SHA2566b49ad9447a8e89de4e5304df07d217efead95b106c54ac94860b31b0268f236
SHA512756893f1c071222ae4b93dae47345f1962208edeefe4f0fbf91ab954d57e500160b27b1fea42b4f0b4f2a7c00a331cd3bfd96cc1951a407ea97f5ade48fa2ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591fd08476ec7c4151171f9337fc08495
SHA1a015e78f7ee18f20fbd807ee7c8668e4ad0b8fd8
SHA2565fcc752e64cd626efa5ac8930915d0fbd30e797daae26f7cbfed797f31cf0be0
SHA51287e58ecaf1ffdd78ac77a70cd3b78b596a1edd27ab18b4c642f32e76978c26297e29ba842bacf66ebddddb2f254ad021bbe786156a5e9d2b578ba84adf19769b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daae3fdd1f46e3323e9c443e8329edc1
SHA1f7af036189adac4df5616e6e10ed433224fd8646
SHA256ae714fdfd614c52e4b1acd45e1f1a40aa3d29ea8d1e9de27fff09cdbe1263a00
SHA51200a6c70adbb644495011d92769e32314c2bbdb7723fc9c8b6b0f5386ddd3bd1a5db48102bb425113da0ea7aa8b9cd6a40c376dca1af75ee16ee66d0168f605dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb0e41740d3b235aae51f87a61984974
SHA11cb848ef6ec220f32b800fb8b162d786dd1a65c2
SHA2569bc281facb324cab9254b73ed7e95c2c255f99c182a430cb4c9ec05b0d2df41e
SHA512b51addd6b6289e83c0f27abc7493f72d383a98ed2d08e4e25e6ca000345bcc2c50a2fd188a13585b1c045f4dac98536f2ad68b247f57a4e8570f3cc4463d774f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5374daab4992dd42c4eddf4a3df99d7a2
SHA18785fc83346583a356bff49d49ef0bc333b06531
SHA256d2ba7c1e2d26e9e0857eb2ada6facd0ac3a08fdca60a2313b0bd69b7245806c1
SHA512b7e219b917d1ea5c08391796158d85c3e7b2e64136c2b2fe996d878db497f1aed9629759a231e347180fa702b0cf9175bc5c516e0f8a17a9ddcff1556f7adbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981e30572c1cea98b88272a872c890aa
SHA10f1e50df68807a8359396e790752e4560d1a03d3
SHA256699ae76bd0d982d109ebdb20fc0dffc80b41240e7a4b31a4484d2bea58fa26c7
SHA5122dabf911ba7be64d619b983c1ec05d4776c760867e6425dbed7d246df6201a46fd2850e5e5d2be9eb48a78a5cad1c25fc73f51b41d57706d0ed85f04c217e8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9e7a44102a1ed240e135faf7bdba3c2
SHA1928f61ddf3a743fd306b30b106230669f0d13da5
SHA25685642d820d75ff6e145128d5e787a8a0382e5b9439fd059ba400c147ef7c37d3
SHA51293b1933e982ca38048ae9ea61872af9b27718aa76f78ad47764a3abd6f3c33ec3b7787366057d29f7efb4e97991159e603f9456db2268e4ab1282f8c1a5d9080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b111172796b08a81005d2736e2a5d0f4
SHA173b583e16b9e4e857ef9738df9bd9c777d5a67b0
SHA25691abcfc6acb62e1015fd2bf0c1bf8652aa1c557957f51f0ff3ef6d09161e69af
SHA512839e0a42822fa00ed1c3d30990a709ed18b1b1cbfcb11bad1587e14519483c0c4bf5039894eaa56b8a95afbec7eba5da8113c234824e062104c7c09091b652d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500acfa526c7967363a054755a187796c
SHA1266a00dd752020ec9503ffb36700349957ad71ad
SHA256a5f7fc73d43db3f09c308b88224b998ccbcc87ba72c08c15c7ede3f39c4d3ebf
SHA51256807c0a78fbe5cec284be6cddeb4990c6ac1e7b5a8846a971ac40f9071611877b4af08282dd927c816df4a1aed133cb4a194e59305504c888b4488096e10e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fe79d2c3bfcb30d5e4bdee9d0c6665
SHA1abec5834b058597e4b8ca82c1fef30f7f451880c
SHA256e3606ccf498028db87655cff8b50fadccafb4b8a818e8be3e3445553cea83e55
SHA5123ff703bbc1a9fce42c1f318a0d1836c852a57ecd9ceef842c673c14a4e46dc22c97c4d5f28034031ba86fd698719e2e9abcde2e3508244c561b5cbce4e6fd4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5482e6c741d544d49c29462eade39ed84
SHA1afe69e67a37e979f2fae71c5e27bf6a213d40e8f
SHA256b4826b934d114420511471ddab440bf39571491d1e8b309ee9efa989e19c0a24
SHA512a8e01fb42a2659836041a15781baca674c4e66ee8b053190c289dc438b87138ad1bf3267194e23ef3eeed83d2497ca22d5cb1f2a59f42b937aa46805ea03e39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbfc64d2bf3d41effb6c93e5b7fca154
SHA13b974da5cc415815a99d6ea44e70cbd3d7a05b55
SHA256a75a16384fa6d3c609ca150b96401019149636c7c60bef10039b150833d947e6
SHA512a3f1190392653648cb4821de95e04ad8d153dd33710bd7f5b24cf90e62165b59920f734b832c739ee511982f2d360891ce693d06d513b8a950c4b355ec99b398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9509175537f164ea0ca829bf0667f0
SHA1bb48e0c594902ea5fb97795b8296c8c9ce79bafa
SHA2569cb16c7fe2822621c158ca8bebd035037561b275a4f531dd44f472e65777fbfa
SHA512644c31fc3ac4490f1085cfbda20fba19b5dc552c53255c97faa5bdb32c55071456fa6d03f7112ec255bd554e0f0557bca30d203cc747768496cf0dae3edf5802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ce6dafbda0f3fc09f08beafd81db52
SHA1178b19a1ae9b557e893de4345a5ca3fff6131b1c
SHA2562b0543a373d1a6412c488d86d2e2c0320277fda0884fe2651e898c719887d213
SHA51208756c88b373ef8a2883e6cae0ee37131839d73a55bcc731d8c8444771936d07b0e7f3170a7cb79229e861c423d491bc4e910174a0feb3202bf626e86e5d2bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc9719b0d2d8fae4406dbbd89514d7c
SHA188f1a2ea9eb95a4f6db70b21d50cb6b81c4348b1
SHA25686fe5df7505cbd7693e1a1c80962d4179adfde45c7ae6d9e887d1a21214be528
SHA5126c7e5f1bb5aa98143867af878cebf7eb383f0ae20bdec8e30c57a5771c7fba42f4ab633d80bc0015ad12a9bfd108dfe7fe325ce497f117c4af8a3a10b99da55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ec9d5f97179834fbf04e8dc5e39a6e
SHA1e158bba2783d79947c764293095a43b7c19e492e
SHA256279dfd5a90ec3ca6bca3eebeb89e007c448def0a374f9139ef5a0c32f8e46083
SHA51275ed3cc736c03365975971934218816c194529a8e40c590c91b4aad645c948affde24d6a49d2734d2aad822b179a552cde11af9972b384db09233e22163d6e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f09dccd3f4d041255970db754a87b4dc
SHA1cc6b9b72180abb16ae59e114552f36b7522959e4
SHA256a9e9567610a68f352bf69edea0fe8d3e5ead4a1e9dcdad29b9ec6383d334c929
SHA512075b121b9cbe2a278977c9d9f304da21eee3572c0cdd00a27fc329abc08b57b0c12661225e351417d72a299510d7c3c44c35e03c1385133e606a88fc76c59041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8cdf36fe0073c4d81921abbfe558c5a
SHA12266dceb61e72d507dd92c52ac6194b0232bcab7
SHA256ac25b925be5cc4d80fa599f6fc65789fddb040ab0aa5b0ae09bf7495a2f0592b
SHA512f64f764f623fcf0a82e007e1395961a752ec1b787eb973c477a1e905ba94da6f347e70b930011603bd386605d7fa807a05b680263f26d6949d788983d074bbe3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a