Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
85cd9f5023142b5edbeea0158c2a9fe3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
85cd9f5023142b5edbeea0158c2a9fe3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85cd9f5023142b5edbeea0158c2a9fe3_JaffaCakes118.html
-
Size
207KB
-
MD5
85cd9f5023142b5edbeea0158c2a9fe3
-
SHA1
5cc50f80ee47b2f523602298e6e837992aed7734
-
SHA256
85e102eaeb3eb3dc8807c31e76325b817ebeb1b9d36c20182cdf61baafc507e6
-
SHA512
8413b745ed5f542041d5350c49442c417b31107ba220b59fe5a3bc9ca459418b35e21188256b08a5cd66d5dbbadaf5740ba8b48be7b548fcb100f5876511d8cd
-
SSDEEP
6144:ijsMYod+X3oI+Yk9TSTQ+u1+/YVSqyMwVE9AmO0fAHm/guky2P:C5d+X3S9TSTQ+u1+/YVSqyMwVE9AmO0o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2856 svchost.exe 2344 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 IEXPLORE.EXE 2856 svchost.exe -
resource yara_rule behavioral1/files/0x0009000000014dae-3.dat upx behavioral1/memory/2856-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2344-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2344-20-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px64EB.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423286519" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b684095eb99b947ad81ee10f7d3569100000000020000000000106600000001000020000000009a5da84ce87b97724b98c38ab71ddf1fb34d562bce747b60556f136dd459c0000000000e80000000020000200000007dce91275761777e773ba25a5346d38d3d7a5a189c4eacc4f88a22b7ab571684900000008bcc8eb767d18171067281bb3aa0f0b637313414198106bdd049119cb31506a304087f269f06bd2aa6692053657ef801d6f292f48b4b4bad732a99c71c91cf296f4386a8b0b17be91720258b9c3b1ffa037f344efe30eeaacb9070a57b4ee9cf566d8a10a9c98174622bc8b9e959f80a39980d00f9091c2f810cfb7cead119f6765284503ad5961deb97df1842814fab400000005815b973ba84335efc9a8db732d532f7b23e0d39e4aab82f547e4387b5224ddc40517ef6e58188747a9d10a72816e15b7fd7a1d71bb32e5136c39fe74c8b11ec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f1ae6f07b3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b684095eb99b947ad81ee10f7d3569100000000020000000000106600000001000020000000ed3f17b6d81687a054f917e5c1cd9abdb77ab6c36af33db8f7ba0cf0d242d2cf000000000e8000000002000020000000bbf26382f527273dbab666e5c1a87640cfc62ce68c44e18038c52a3e05f669d3200000000f03a5976f792bc49405346b6f494effcfb1229138110666435ade0a410219a04000000032838fddd05340f4d6c20ac70fd7e214293b8e5ce67732b43f446ac1522b15c190511dbf493665c2ebfb8a67f9cbb610ee1342e69528e719acd1e5123c56f2cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74434671-1EFA-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2344 DesktopLayer.exe 2344 DesktopLayer.exe 2344 DesktopLayer.exe 2344 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2700 iexplore.exe 2700 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2540 wrote to memory of 2856 2540 IEXPLORE.EXE 30 PID 2540 wrote to memory of 2856 2540 IEXPLORE.EXE 30 PID 2540 wrote to memory of 2856 2540 IEXPLORE.EXE 30 PID 2540 wrote to memory of 2856 2540 IEXPLORE.EXE 30 PID 2856 wrote to memory of 2344 2856 svchost.exe 31 PID 2856 wrote to memory of 2344 2856 svchost.exe 31 PID 2856 wrote to memory of 2344 2856 svchost.exe 31 PID 2856 wrote to memory of 2344 2856 svchost.exe 31 PID 2344 wrote to memory of 2312 2344 DesktopLayer.exe 32 PID 2344 wrote to memory of 2312 2344 DesktopLayer.exe 32 PID 2344 wrote to memory of 2312 2344 DesktopLayer.exe 32 PID 2344 wrote to memory of 2312 2344 DesktopLayer.exe 32 PID 2700 wrote to memory of 1448 2700 iexplore.exe 33 PID 2700 wrote to memory of 1448 2700 iexplore.exe 33 PID 2700 wrote to memory of 1448 2700 iexplore.exe 33 PID 2700 wrote to memory of 1448 2700 iexplore.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85cd9f5023142b5edbeea0158c2a9fe3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2312
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275475 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD509b74fb9e1d6944ac53190053af21a50
SHA1ece35c37670d8483c7d9a981411549c0250dea9f
SHA2564666d126563ef273733594da8f3a0e28afff0980adc9aa6162a06bf541b5d6b6
SHA5124ccc77843fe6bc6f4ad5aac8a8981864470a9a3cdd11e7eac7b5e4e7399c1ad531aaa283265334b7688ca1b4a50a31d1d9f84bf75a02ce21ef7bc30258d08bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c90a272eaad99de60b0ef9cecff0e2
SHA115f0d42815b40e2db98ce93dc49bf606f9351fa8
SHA256b17194e0af585a2182c98a99bca08f52226c811d3cfc51b87567ec554f821f3a
SHA512caf7d0c79836065b5f858773a014e448ef9888bc1aa17ee6c333d2f9f5bf6c982d15c4cf89b3cbaaa8b44f95c5557811976ce8801dd698cc5010d3000ae95882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cab4b90b2a1bab8b7e49e1c44a6ca70
SHA18ae2b20e073f9f6016f35fd901a4421a1a027a4e
SHA2564cc3c3a295b4ef0032b4f9102cb6867bd02e9011b1847632356dccf83b160418
SHA5125fd106494ef56d607ccd99f240f889973716d97e1ec2020cab29f987cfdeee2851e4379522413f56b1e225d6fd58e674468b4e79b78bc0dc4d952ab468ccfa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f159c3e7f0333403230a9630baba98d8
SHA1dd6c93176e1155a399a6da2ec615ce4b148798b5
SHA256b4b646434d246f47e9cf14a5892e0165e442b6e625bd31b819621ff546a4882f
SHA512f9fe15b1f946915244f0f175a8db91cf01ecfdd6132079c45e9f51390a65f6b80340498467f6476030ad335c164c093d28b9b15be4d7becf3874bf2035516877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79ed204a602f1f3d15a64e1599a0dd3
SHA1a84f501aa4ea9a7436f7ba225c43e128c4a77705
SHA2566521ff8a34d11d0d87fb566baca548c8207162d4f4ee8f0769c31f75ee1a152d
SHA512286ef6a967a90a87db15f418929acff09430bbd4ddd529db00467c970f5b971d791cd04f7cd25456f862150b131fe58c296bee5940a5eea6131057737f578352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4259fc1711b5d632fa82dd85d04ac5
SHA1b37dc220d6670edd14e83a53aeccf35a2e4b00e5
SHA2565eae62fdddbfc1836458a2a6d33994e5f58af1087c4034aa78c007d15f04b53b
SHA5125f5249398b8afe50af3bc44e9fae3705da4021694875ae989484a8c3a5eb9575f3afbabb017342cd5977499ed02d779c13c6fe8928a287c5e69b665905a4c4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ef4512712fd4dde1c18a50b1721fb1
SHA1898373402df0013bcfcfd026d410f00b878f4b0f
SHA256d2620df5dcc7f34a73fb91edd496c6498fb8354313c6585a96e5933668493f33
SHA5120589af074ea67a092855dc0628c6998bc68d86aa9f4bdd5063ddd94b510bf4d299ab6c511c9d41fe6f08c7ba7cdd9a68de7c1406763da17e532dfb4fd5bcd921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576189705cca6cda9316b2bac53e48fb3
SHA1ada86dd6f21f2415e4ff25556449c8e3b5ea48b5
SHA2569647e64f1d28197347d8135d38cb51c7b7e5a582401f872d934f0a0c964fa305
SHA5123ea96671a3b6c7f7ff756e78f888ff725ee890f996249c50fdda77d6fedf49dfaddbdd884e62a21be4685c25372a43869470adaac6c99ff25c1d5b400bedd6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698cdb345207da2be088f299373b577f
SHA1a76568630d6c3defe5f756465951c463e2b9e09b
SHA2561269dc9acf4f201aebdbded4a02f909a8f02daa65b5e85208477d9c4a90574cd
SHA51254af33058d5577ca3ee118e7f874c5a6d8e42528e3d5c2b40673c6d061ea30060e8bb934243b1bc0423c8255868df62653d8c016c8ca7a280cf1fb7ac2441f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c4dc8b38fce05f6903315be4c86105
SHA1f121668028348f1383ac7ffab8edc921e2041644
SHA2569877f083c30003b24ebfffb00ce32e1c5f0030a198abe96a1c467dde6b45f33c
SHA5122bbd00aab62b2845550ff8a2977a1cd07fbb3570e5f3e187e198415a9d4911a1fdb5e33c0fef400d8e8f0a2801e773ffb94134f8dc4d65cc315632549589ae6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d886129ac7510a7f7a5238d83bccd57
SHA160be1f5cbb3535b4d67ed0afb5fdf0464ca26684
SHA25643e8ec9531c6feef322135c07698f9f8bab3c562841148f6f5dbb88173941b1a
SHA512213f1a6d57f64299ab3ada8c2a49a74c9c6587a78861614441b60116f7a9a5de8055624323bd220c5489d2be6f44bd72330bf984cb62caf8741eef810baaca5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ab978149e79c895e863cf52c7eeae260
SHA1d87d52a222764deeea5e1360a82f7b32beaf2165
SHA256df0c79ef7924ea5ec0471fab39b5970070a065e45e28ba7f03d8b07b80037816
SHA5126884e316fb816674da328852f035f7477aa3f6e12a0de0e4f62bac220bfa79eb251a9022567c156c26519e61c90946ba4a50026f7b89ec28585789556d3b0124
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a