Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
9c6b9774c8f622e994c0ba8dd015f887_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c6b9774c8f622e994c0ba8dd015f887_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9c6b9774c8f622e994c0ba8dd015f887_JaffaCakes118.html
-
Size
158KB
-
MD5
9c6b9774c8f622e994c0ba8dd015f887
-
SHA1
e49e09a93fd42bb75bea3978e2e0e64a5f94bb99
-
SHA256
1cf11d2e3985dfae0ffe793d03da63e95601ffc92af1d70841c8c919ca01637d
-
SHA512
b9542f7c858f3fbdee1ac511ee592f7071fada20be8ec10d12a17f55edc152ea9cbd52caffb92a439bb85ef8a95e6432f4e20e0282afdf758934e2e71c7b74eb
-
SSDEEP
1536:ilRTP4me88XV3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iTcF3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2912 svchost.exe 2312 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2860 IEXPLORE.EXE 2912 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2912-481-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2912-482-0x00000000003D0000-0x00000000003DF000-memory.dmp upx behavioral1/memory/2312-491-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2312-490-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2312-493-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px3EA6.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DD98C41-2788-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424227106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2312 DesktopLayer.exe 2312 DesktopLayer.exe 2312 DesktopLayer.exe 2312 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2864 iexplore.exe 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2864 iexplore.exe 2864 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2864 iexplore.exe 2864 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2864 wrote to memory of 2860 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2860 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2860 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2860 2864 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2912 2860 IEXPLORE.EXE svchost.exe PID 2860 wrote to memory of 2912 2860 IEXPLORE.EXE svchost.exe PID 2860 wrote to memory of 2912 2860 IEXPLORE.EXE svchost.exe PID 2860 wrote to memory of 2912 2860 IEXPLORE.EXE svchost.exe PID 2912 wrote to memory of 2312 2912 svchost.exe DesktopLayer.exe PID 2912 wrote to memory of 2312 2912 svchost.exe DesktopLayer.exe PID 2912 wrote to memory of 2312 2912 svchost.exe DesktopLayer.exe PID 2912 wrote to memory of 2312 2912 svchost.exe DesktopLayer.exe PID 2312 wrote to memory of 2120 2312 DesktopLayer.exe iexplore.exe PID 2312 wrote to memory of 2120 2312 DesktopLayer.exe iexplore.exe PID 2312 wrote to memory of 2120 2312 DesktopLayer.exe iexplore.exe PID 2312 wrote to memory of 2120 2312 DesktopLayer.exe iexplore.exe PID 2864 wrote to memory of 2552 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2552 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2552 2864 iexplore.exe IEXPLORE.EXE PID 2864 wrote to memory of 2552 2864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c6b9774c8f622e994c0ba8dd015f887_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2120
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:406544 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b88d1109a94147fb9f91dcf19011193
SHA1118074e499f91436fdd03d6252c3a087f598b56d
SHA25696f18690439e0f1745dd5137bc72f720bb35fb68add3dd61099bd00ff020798a
SHA51222460492f550e265066e0b1162e5a1ebd0da90387e9f1975f9f317bcd0e0ca5fa9780373f591b258e19e4be28a089613965f8ed4d03527ca5b3a712ab10e4619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5defa9b38057f0311cd9fae266050b451
SHA19763b17834ab338c2a6f07fb51115b3751da55f7
SHA2566a5a9aeaf269699f4370603717666fa07066b59cf7f378b56079c9be5acb3c28
SHA5124200d42336c7afa4e086a3b9498e1f4a903e49d452cb73c813b26e576e726d593d56c9b91f703713a66ce95206df073bed178a63cca9523dc814b779e434ada3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27a0c8ec11812f5a27d6b5d6b97965f
SHA1d737920d4d693bd1110a02d3913fb6d09b903fa4
SHA25614a5ba80a831ea162a6e62588d539a8bf4a7aff568ffe02e0c2c868fdb976a50
SHA512e08cdcbe6527acd1dabaa137743ab0b538b4eeb98c6b5c9013176a5b6c12de782db67f862f3b726412f7fa4dfa6cb6616cc72b860e69a73dfc5e1a712c64cc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c92ab36821c0c69b3640de38bea7251
SHA149ad330031b033b94c0b443a4660b93660941ff7
SHA256374f40efe82f6ba091821d80c1cd1faebc41b088300dec2d78dcdefbee35950a
SHA512eaf3fb3990906d96da2f1d660f65ceff8d6a4b8e34a0363cf5a596e648f671067e8c04db2f6c486b728eb3576009981b30f9d42244746a81fa60462f9841aadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472d78e207710379a634e7413ba0fa92
SHA14271297fa30754dbca7803869861feae749407dd
SHA256d8fc64a106583be891f26ad0dffbfd784662f25b22249f59838172ae825dc808
SHA512d4286f085dc9d224cada048592e726d9f426aeafc5a8f523ab25eb00c8b2196629c1cacb1171883ee470d4ff07c194b95daab014e543c804850e47fa7412712b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54725f9515836055755b4e24d79314e31
SHA1dfe599997c29f4106e927cd2aa966ce21902e40c
SHA256538493e6065d156b4b12f9e2f45af98b1d872c3e787f574eb6a39929144e4dbd
SHA5124eb69588063ffa1dc010f501c7f6c7e5b3fea4c0f5162c704110ee99c3a19e698ace055468ba941d1a7019e8ff8da4b61f3054168e5d61ea9574b75caeafb062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56066d805510e23bc5b8edbbe5b4c7035
SHA1cb5c7518a72495f2692ebdc6ec37e6d5fe52282e
SHA256da85fab2f200c6d678e0596e35e3c982b11bf81e64b86e241858e6d5a5d57329
SHA512c0ff30ed93fffd97e4d2165896351913d36afd47d7462ca2c15ac5f0e5f15aa67f61824b2f3ffc4b5084bb8a9fc78b7a77e5b2914b887f90afe221d7281e7b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1d837a4adb0f043100d91da66cb1db
SHA1bcdee2421255759967dff22c06472772c677f8ca
SHA25663de244a2bf44e0e802e06845e512036136a477635427357470333bab93bf117
SHA51221e775d7f028fbbd59f505cf59c6abe44edbca5f840329065b0920ec54d43c10bfb9e8c3e6300656d838061958148f2883db42e445d5c9df5d408c90fe018880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ece3eb0985542fa3979b880dd149047
SHA1519994560806b00bee34bd9a4f855e4e10ce6022
SHA2568c217810921ac81079644bf330b0e4f3e83ff9df623f77a3bf2634d33f9bcb95
SHA512496d80ff9d55be0102b8fd2616a114b2dbff8c1f1c9acec006edc2b1395ce1d7b8302392cdaed23a6a10a6da49716bc1906af5f98b7a679ef56a508e70d50196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d679d138828a9bb520259910995430
SHA183e90cbb1bf3db0edb071713fa20bc49dce50e15
SHA2562cfdf9d8415e2ed7a5079451018f8cee658c9d4464d16ba2f396ce18f882d01a
SHA51244ce2f81fb63afbb16ee359bd922864ae7952dda539dd151c4ffa23a22d2f3f82838b4483f81601b6f2f7f7bf711d7992b757134c31bc2418f2ed6d1e5bad316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b491fb591b7a4b6dc596fa8be4ea9cc
SHA1dca4a8faee33894a0c5c2950f500930923956390
SHA2569c2a339ae679f83fd3630c3373396d6f20f4306f195c6408dbc7010dd943e90e
SHA512fc0624132a1abf3a7feb201b63c25442ef45043dc2861d57e58430f5ed4b2d93b9c8d4c3a3cc737ade6a1bc01573d426e7b5b2176492e40c527ac465174e246c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216c2209a820fcbe9d541b19da02c329
SHA15395729a3aab69bccfb8bc3cc135275bcf878c51
SHA2560abf2cf3a558e9497840b3de55de15eb825ff68749756d3b5fe9caa4ac59f7e6
SHA512370dc21ce7b0fe1d0c036c7ac7b5b68bf93190f6fa6b70ebd233c69535412197a665103fc3ff63271a97c6289c93e43ab1b48894cc836ef4db4f63a4755e7efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f41411463e9f0420403d64252132cd4
SHA1f159cab869453c84267ca9b5ca56414e4e450871
SHA25699626b186f8928b9c2f75d954f24992d473ed961423098875530174dfe0ffa81
SHA5122030197a745941ba34d6eb352ff2bfaabf957eb6a0214a683e83633b2ab8b808122a4327410186132d583068a6effccd36c1c318afdf45c528d9a5a75410d17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7781af788e4d11c60fa0bed70fd606d
SHA1a7b999331dec92fa674e246340424766c453b87d
SHA256d36f78adea30f1e27894d95bf8509bb2ea23d3a61c0461fb8a75164b845b473e
SHA51289fb576caf2d11f6250e66201be87a2598594ac51cdcfe02092237607b1a859d0b9852695d098f44b6849b9a2c4b405189c329b25c36a5d04dfde9d6ab896644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ef6d1efb0d5125ef07c637403563d7
SHA148650f44ee8be434503c6c0baec60dcc394ffbcf
SHA256219c1f9b41ee2fd6d8b973d11b8ed30dc2483ec4a31e8be35824232ac10cc443
SHA512ecec2c8d6f30ce269d12af517bd6ebd60bcbf7a99b3846bba814c3a0c26ec5616145868ab577664c489a97443d78500c59afc7d0b70f3bc300fc390f91dc9f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58deb0d3b4a6428ccb2480488618de4bf
SHA117e23af62afd171da071d7975de7205bee1e8f03
SHA256733a5a0a9db89d86913e986087f213fc5b715dbfbeedb8436206a342d6593037
SHA512eb36776bf81a7334ab457564ab9ee3b814bf03a1b39df6cfdfe6ac4369ea081e77e38d9b939ebd7cad7a64bf650e4decf5292ce36907e35c2516928eb387edaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414f33b4614ab41b7f706183658a5c7c
SHA11989a02c77a484a334d48e0bdcbe5c498f90d725
SHA256a2764eb2423053e1f10a0d834541512d88c96e836185667b4abe89a0a347e7bd
SHA5126fe2db6526b17fe6f033ae44f19898e87e3def233fd2af4e6d63149ace53aa842353485535740aba4478a9ba0536d8228971f00a2b601681708408e167706050
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a