Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
7d634cfeea8d943692a5069890d768cd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d634cfeea8d943692a5069890d768cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d634cfeea8d943692a5069890d768cd_JaffaCakes118.html
-
Size
156KB
-
MD5
7d634cfeea8d943692a5069890d768cd
-
SHA1
2aa2d67e0c8b60d68c65d63bac1f4ec826da6328
-
SHA256
78c0b2d4c5e72d8f5c729e697e23fca760296568c551d608f78c0c2a36c1e567
-
SHA512
d51e9386a7b7d380c73e616cddba149f0b7fc04fb4d0379a6bac17239c1c5bde75bb932d0aacf721db3ab84387858ac7ca50561bca1a91454405f1571d8f20fd
-
SSDEEP
1536:iARTKiAdORZm484yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iqKORZ24yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 884 svchost.exe 2076 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2248 IEXPLORE.EXE 884 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/884-482-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2076-489-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2076-494-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2076-492-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxEB58.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423070434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56F63491-1D03-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2076 DesktopLayer.exe 2076 DesktopLayer.exe 2076 DesktopLayer.exe 2076 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2760 iexplore.exe 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2760 iexplore.exe 2760 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2760 iexplore.exe 2760 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2760 wrote to memory of 2248 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2248 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2248 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2248 2760 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 884 2248 IEXPLORE.EXE svchost.exe PID 2248 wrote to memory of 884 2248 IEXPLORE.EXE svchost.exe PID 2248 wrote to memory of 884 2248 IEXPLORE.EXE svchost.exe PID 2248 wrote to memory of 884 2248 IEXPLORE.EXE svchost.exe PID 884 wrote to memory of 2076 884 svchost.exe DesktopLayer.exe PID 884 wrote to memory of 2076 884 svchost.exe DesktopLayer.exe PID 884 wrote to memory of 2076 884 svchost.exe DesktopLayer.exe PID 884 wrote to memory of 2076 884 svchost.exe DesktopLayer.exe PID 2076 wrote to memory of 1512 2076 DesktopLayer.exe iexplore.exe PID 2076 wrote to memory of 1512 2076 DesktopLayer.exe iexplore.exe PID 2076 wrote to memory of 1512 2076 DesktopLayer.exe iexplore.exe PID 2076 wrote to memory of 1512 2076 DesktopLayer.exe iexplore.exe PID 2760 wrote to memory of 2200 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2200 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2200 2760 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 2200 2760 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d634cfeea8d943692a5069890d768cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1512
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275474 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08efb4eab9fddb1e2144b8bcdc7365a
SHA1860d0b6f7189aeb8630a802e02f3b63de5c8bb00
SHA2565d2d672ee39f7dd9c06ff09a035b088f17ed925da19c3692d32675861187bd71
SHA5123a3d07b54d7f7d94ce16646a82eea8cdbe1daf00ab8f7a9135485c2ddd61d74629b039a88cf3597c3f5bcdfb109ec46b4c402ad8a57698b1992951329f74e46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583098db30507396e34da11351ac411c8
SHA166a29e350066663c18a7eecbdfc878f81bc4c44d
SHA2563b1e3bbd5863e33d707a84afadfda034d6cfa9a0f26caa356626e01b3184277d
SHA5123272919ba26b490a8f5b32a9affcab8b002bbf4e37b253ba7f95edc7939a29cbd1e8f62217098adbced1f63e59518e199cae1f6c46fd9f910dd2b452e4064cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c31e4f32c8bb3bca935e905ed9535b
SHA1c2d7895dfe03b085952f508ae0060063627b0419
SHA256d826a5f51658ca7d122d9416918e81efb99f21ff3e09cac7e9d13c554840908f
SHA512739ae665ca56cfa0910483a98be5d5c670b308e7eaf213a8a15272ce523ff9333b29c3331ae29a57b502f438f6c9ac96982d0c714d8645508b1996e340e867d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574af2f4f4ef08f3712cada2364d79f3e
SHA129a828f8a3204c8d043991f963e8b430c0ab1e2c
SHA256b1813ef5aba220a5c83364d824201fd51c8f05fdaba9988ec002f7f18d25fd27
SHA5129fe6f15725b6760cca6db01ebfb7bd86fbfa24aede16dfbcd208cc94fd4509372e81f2333a8a16ec7ee85e9101db78c24c8762013d0f6b6437ddb644bf75dc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9e659c9eec9ca874416a0d5c8aba29
SHA15380cc08585b8c8395bfeae5b736a2d820793202
SHA256e37521cf907040c8bbba9d55c82cac55904efefcfb752c65b209d391b1fbc933
SHA512c488533da6975c3aa45197e95480062259b51fbbde8c6feff2d0f02a1b5f43158e83d5a73f859f9a609b3e8dfc3567e590f1252b1274f8d4f04ef904d46d2440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd86ade54d52e764fb570df2a9d59ac9
SHA143fbab2efb45af8a0452de7d631ec701e839145b
SHA256826ad0b69891cb5ef5dc9f1909ba80abe9f7c61c5993b095cc51eff17d16f0cb
SHA512a73ca3ef93dbd412566a40e8023e87b2081f9ec1ca86db57de9436573470ab3342c8f45cc78b1b51efef8efa8f152d091aa56ff138f7f35f9ec24c6137245edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a8109be3461cd564c3b2001eb7c62a
SHA1a2a120532f00b11ce917657771ad32ce1a40935b
SHA2563da3177a72651f71b04a4168db52a627a20a899e1d63db3151270d4b5c28e588
SHA512457324c0ef9b51d27654e80cf5f075aa6a561b4d23a3e178a5d4cc86540fb4aeecb1c6cede593b983e6ca7eeac50a90a617ec9ce7d01e3204f88cb0412383727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac86c186053d817bc1eef25e38dc9b73
SHA143434e689ac386720e14f4af713f51fe23794164
SHA25606ac2ca56562b33d2251d4a7e05ba8118eb39191b4fdcb7a7afada5a2c0da55e
SHA512c3752b31508376bfdd4f6bb314499fd302540ebcf547ea3d65d92e5da5a955358a76fd299c8b2f05f181ccc9f4c6094d205f4866d019e926e43513dd10469342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5d01ca12007454d9e14a45ef0b6ca1
SHA1bd1890655d3ccc2798f4a38968891fa01c531478
SHA256a4217a236ffb8996bafc20dda44318ccc929b91b13b5cd01b560fcd5dba64c18
SHA5125f66e6a5bd6d19dea405e3ee7b7b8a22bb64e3d13f443bfef87e32facded1c82e043704870060f9bda491a418973ecb5884c308df24c263dc27125a94819927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0811ee55fd18eeccc002cac4cd02f59
SHA1715156309ed3b7829b9b62e444d54141fc0056d3
SHA2565022066bb2ffabd5bafa55038aa3bdcdb01d28e7b81cc4ca85dd9c1feea1bfde
SHA512d1899071c6498405e10f0484481116dec207dbcb549df2e3ee931ee6cda4a5f9f1d4d3dbae8c2b148219bfcf8028551ea9901382305d5bed2d51bdcc329a36eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f3f625fb7893ad289d78056a63b6da
SHA1f2588c98409214eb978a10a6caaca764956257c6
SHA2569b79c0fa064165c46b25ec9a3d5209f0ded77a7eccd769a107c8772d3aae142d
SHA512fb24769d691224c3747d34ecb7a110211b9051e79f2b6112a19ed1d5dced13566641df249120a1f7c954cc8fa933388f6f7f05601ecfe95ec453cfe8b460bddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4589a49daaece5d98477c6ed2a985d3
SHA138aac9b75b8ff604421ee0f41e4ea6d5fd5e7f83
SHA2563e9708ea9732ff3121ba159348ee5d0268ff9f7ad31147a2610f61f9e2741798
SHA5126c54a0efdfb8ea9c1d5ea6b2f9779035ae216d03b7586b219b965b5b363a4afcdc86bc39ce744842acd9d7c45e0d41bf0944f6f6cff970c6fd992ca5ae01f389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b587e4e8457640675fc76a74bcae68
SHA1a64a2346ac3ab3289a51815254c430ccba0bf68a
SHA2567518c29e25dff9a4928959100011e4df584ef33358b736236a05c17bf401ae9a
SHA512288f9c4c62de8014e2d43e7653c8b05319eaf61022223ad5522edb9de61cb65d82f93cf062eb37f63a5d2b765ea6328d2b11faa88734099b4db787acd1922ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dce0ecc331d71137ef4de79e5d463ed
SHA1f6e65181d86c3e06775a49dac6141a75fe0f5c50
SHA256f4802279d68856217c151bc4c67d48f01376d61a69576480071cc51c1e46617b
SHA5128b9dcac8e94a389c9aa059cde16e3b9298c4f8c17f1168cffa90e925c69b752f16be36f85bd33e30159515b59920c43eac3d68ff7fe0ac04df0bdc459f479947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5d452206c91d0caf0c28639b671574
SHA1d069346edea26a65da39c9c9c7eb340740df9b91
SHA25623e1ff170b4e07bc37f7ecd0c1a2bbe994f8d20e2bcfebfe742ea74972660d6e
SHA512b8d1140284b661f4807f0d647dce679cf4b84062e752de05664497a01d095f4cb9b3c36e636989f7dc695ffae27224b6b8444a71760b5c6e3441e6e9c9b12e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9ba6f940cd8177d660691ab407322d
SHA15605bac727d85537ec24e94df90c5a477104cc0b
SHA256c2d1adf39a141715dc5f2368b56cb2ab25240a0801345c7e0b3cef4774c3d26c
SHA51216c8b3cae6258ffe3cb5e666fd8bc191134c3ee316c1e2f55189eb15870b47e273a5ff4b6b4235c2ef87f83e81a54d8691b1ccf3872752bf26fbac8f83b421d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a72dd6f01dc0df243fe7dd6e77fe0d3
SHA15dc462cb9cf93d298f18be9d6111f0435ed20252
SHA25688301c023186b0c2f7ad02e14babe89207f56ff70cb6f9fd3a2e3c34c5932b97
SHA512b21c7fd2708ba5b6bef529bae78ce569dad35d5533d1ebb8b0016a0476bea10f24d44d25aaa2a24fe0752d20bd2d29d1459cc6454aacdcd840d6884c78bb6323
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a