Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html
-
Size
157KB
-
MD5
b699970cedb54a3d8b21a17ba783bda2
-
SHA1
c28195fc402447f3401cd25ce6e69872e18cfb32
-
SHA256
2344285be204c7a95ef54d725a1aa3579f4632f8942c42e0f7b9bda0bd206bb8
-
SHA512
fb511322684a229f66cf13722a24248b437aa38628355b8babdc706be053f8b226a6e52465e131f5e6e1a52a9e4f546cde20a6aa57fd7762e797aa89ab58bb2d
-
SSDEEP
1536:ilRT4qX3Cd//ijByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iTu/ijByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 784 svchost.exe 1928 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 IEXPLORE.EXE 784 svchost.exe -
resource yara_rule behavioral1/files/0x004c000000004ed7-382.dat upx behavioral1/memory/784-387-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/784-388-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/1928-395-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1928-399-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxEDC8.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16378771-2C5C-11EF-A01D-D62A3499FE36} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424757817" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1928 DesktopLayer.exe 1928 DesktopLayer.exe 1928 DesktopLayer.exe 1928 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2456 iexplore.exe 2456 iexplore.exe 884 IEXPLORE.EXE 884 IEXPLORE.EXE 884 IEXPLORE.EXE 884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2632 2456 iexplore.exe 28 PID 2456 wrote to memory of 2632 2456 iexplore.exe 28 PID 2456 wrote to memory of 2632 2456 iexplore.exe 28 PID 2456 wrote to memory of 2632 2456 iexplore.exe 28 PID 2632 wrote to memory of 784 2632 IEXPLORE.EXE 34 PID 2632 wrote to memory of 784 2632 IEXPLORE.EXE 34 PID 2632 wrote to memory of 784 2632 IEXPLORE.EXE 34 PID 2632 wrote to memory of 784 2632 IEXPLORE.EXE 34 PID 784 wrote to memory of 1928 784 svchost.exe 35 PID 784 wrote to memory of 1928 784 svchost.exe 35 PID 784 wrote to memory of 1928 784 svchost.exe 35 PID 784 wrote to memory of 1928 784 svchost.exe 35 PID 1928 wrote to memory of 448 1928 DesktopLayer.exe 36 PID 1928 wrote to memory of 448 1928 DesktopLayer.exe 36 PID 1928 wrote to memory of 448 1928 DesktopLayer.exe 36 PID 1928 wrote to memory of 448 1928 DesktopLayer.exe 36 PID 2456 wrote to memory of 884 2456 iexplore.exe 37 PID 2456 wrote to memory of 884 2456 iexplore.exe 37 PID 2456 wrote to memory of 884 2456 iexplore.exe 37 PID 2456 wrote to memory of 884 2456 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:448
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:406544 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234b9419414ec74c2fb959af3156c74b
SHA17017d6335447e490687c1a5975744c4d2944d84b
SHA2560b4e5b32ec059222959d6802192b67264d49ee8674874cddc42e10d127b60480
SHA512998857aa3d8a7dd91bc55ea8409f97af8cd8a1a90e2f4dd89e11bc0e497fc4661d87b65c8bc6775c2e09c395234d41f8442920015904aa94edce4642b857f98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba80bcf987d6b660498770d9f2277ae
SHA1762a148e28188182a6869fc0659f7d4c5ee259e5
SHA256d75f72489a653101ff732a8058d10a2dc98b798afaf20993f02587ce3e72b0e0
SHA512adbd0e1b9a2c00c5a335aec0077be61eace8e2aba76a1f8d9d48819ef12b8a410500ccadd7314f18f9506514428ec0391d25d2dffdc291db94fa3d8476ed51d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57470b0c23fdbced445bf50f117f2c438
SHA1dc41ee67d93bd22a9664582de5bce7217a5c30e1
SHA256c6b45179b22cda3bb664f37127af4ec3da6c56736fddb80df98bf5ecc0844c12
SHA512bcc4fdfc178da5f1ecc33fdf1b914791917cd00a08245dfb1d72a7701c906cf1482965423de5f538d6ddfdc216ba8f602803fbcdd76dbf06ce8586022f564bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab710ebe34c48317b3d37ba5c40b27aa
SHA153bd07d1af8f75679b0382ef0bb1049c4a9e5864
SHA25631605294f7c222f6e8c5e80af6588a76aa18cd59aeb0c59fb17fe4aa11c6935a
SHA512d5a084817fce967eca71451cc55feb97879de83aa084f0adab27e670e3300190f1d29755dd96afd4377dcf6e2c8f661ba93f8e71470ff6f15c96b25bc2290490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ce13f3b3b47b0fff113bad418ff2bb
SHA172267d14130ef64aad47d65375545661b2b83b2a
SHA256b3bd101f17bb6b41c0f077f9db57d47200d8dc59e36a5e5ab5f1ae63aab02221
SHA51289f0dda2e7f3000ded4c140066d9bb72b7b84d39f239a33dd1cee9fa7f5095032280bda3a7eff93b19e9619e5a13fda6cfeff49a7345c6c09bf649f240bf1ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e299c1e6517fe15c604c1b1b72c2038e
SHA1af0c4701733b2ae435cf9b57f0a6793a29dcb1c9
SHA256799fe7912378778386fbf6aa77aed4f875c0b96dc4bca419968fc5058b36cf21
SHA512549a668306ac4d371b5ceedd1a1fe6e26333a3f5ff70329411878c9614091d843a2bf263d165f6c3f554c6747f9509aee3cef2ac2e244c0a2005d7ae954c6b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8307a790b8910eb0ae0279ea08108e
SHA142348a7134c4cc184ad035e150135d855de06e43
SHA256dbde4756c7e89884276f3f6581cba4363a8b7547e8cc741be76f329b12ce8f21
SHA512b7125027455707cbcd2d0b5ce69d96195b474161eb49967d709dcf583fe12a1a7c2a0e03a27f5c122f94029a24d8a86e91d7006e39835940a1f1789239b308c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e86b39c38da67bc41f212d949b8fd8
SHA1d1f8d1e2c6f33aa620f37aafdbce282b2a5c3b11
SHA2568685c17a2e41fc3285e24153a635126aa03f6ff42984a52f31a7f30a14a1102a
SHA51267ba15f667c27c4f3c14c696ad76727bf968e37411125a4ca3bc3bb67a237e482ef4eb8e43a3092fdb3bdfa006350ee7edba3cba6564007769e6e8e6600d874e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578392a2f3256d0af92d49fca790a0345
SHA198b3b57d4c0d4fcd10c5b064eba38c47ec9f2dc2
SHA256cc2894da8b60c6befe8a27f5da05b20781daad24afc85042bd2873ea612b6d99
SHA512d74670c54c79bc7cd2aa9a1185d87579a65032b9d00b20250fd460893a5e52cd186b2b9a5dda342ad1d07587a2e8206e95de09e207a5c003471e6e4b5daa40dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df206de70f9832f9b6b482df4a7ecd87
SHA1f3e2cbb201e7cc12052399f027562c9d8f86985a
SHA256ecaa0496f8ebbf3ff8e58a02288d52d1c1a4fe4c39005bc5626668453f53552f
SHA512fffc32b0e6811da3794818e75add06986fd0d7facf2d353a7bdf83892dfcf928214941243a47769055a23737f9fcc6a4dd199d137e6e6ff1c570209ef541640c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a910b08267b473f9d51f8a102a98e30
SHA1dfd90acc5a7b1053496de18189b8947607bd74f3
SHA2566f8a1ad71914fc4329fba52f9e5a2be383b4637f6d9d6054dc7fff893d0795f5
SHA512dd53fcb0d121b446af3e464beaaae715303752b82e9e95fe97abe604e49f3a4102adef53678b0730f9773dc5287dad3998542f65fb7e65176c4f2696cdd38067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189138e3ef9f7d835f95c7eaab39723d
SHA19e60e86b4d146c26d8721dd5dbf3f153e263dc9a
SHA256c1b2c458c15bab8c45859da349c9116842713e31687727c8f8923f913322d2a6
SHA512cf55d80a5b2d36f699dec22c9b0c24d0867b863f89a65c30ec3701b4b639685d0b1534d467a4dc81c82c563421b759c6afc1b7f77490da792814e891f9eae83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ae89174de712595fbd78bfd970e02d
SHA12fa1d65585bfdec7adbf134949e3118383dae65c
SHA2569ce279d5c5a707b476c46964010f5053227f7b7450c8412e2add642fd18e52eb
SHA5121d2eeb87f73a5d093793b8f94471f925736b3a8188aa028e470312d4b438eb91e72a024b33025c3990e5cd687581ff4edda29f87e3b30eab17c1193d930285c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b945531eb9f981467f2590bf657140f
SHA15c3a395ba56281f0c4cf784ee65bc1c1fa170575
SHA25619d8782900afdc6095c87cf1d273c645a2b04191d3b289b14262e235a7e4471a
SHA51229a5c40aaef03253862cc0e9b30fcfe90fa0ccb50076c90ea515447da1a1af8037fd25e1889fd26afe9f770558a5ebe7633ff42f1f90a55c5cbc018bc6ee3d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424d4b2f0ac016498c0567254faf822d
SHA174cb65bf61361c71e9d69b48645b0625c6eda8c8
SHA2563451fc7f91fc78c578dc4f210e3d9c34fb4c7b457b32bfa5d62b3f58efadbc55
SHA512a376a909133f377c742493d7221ba683a9ae95eeea4add039ca703afc5972030005a0ca151f54dec9fcff2de8a431ec7a5b811227fa5e5204e2d14159e3ce014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ea306a193bcab84ecd7aedc3156d6f
SHA1a7b9a732eb08bd204715e5ca151c85b7b1dd5eb0
SHA256094d514dcc573715222ae8f4a8a0aaa28990198d4356fcd6d472bb5dfd9815c2
SHA512f3e833ea06649497ab45cdec2b447b54cb4817df21192a48e8499044e026c2214f84fe11bc6a7fd23c4b9a8d8d3aeb9128cc096e80a0350c60c664d55be07a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320a63fc84a67b0bc507fa8d472d481f
SHA1b078c2d1b285da0efa7c9b9d7acd3b46f58aef42
SHA25638e454c0a74a65c3982f0ab1736a3e69b91932de72b5ee2922d9b23ff57f2ff0
SHA512fbada206debea3d1124af1860580442431435a49acc9113f378115043f23ed39d18036d2028c2d373478db07579c4c86ea35cd428c8e98c0def6f9f3d807bf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc8b9b1c48ce6ebe7fbb48991ba948b
SHA1d4c06cf6e6d71d72fbed2ec3994fe56a9c17f8ed
SHA256b4d8653086ff52a42b4073d7bdc4bac833f1983fb9a6347a87390392bbb1fafe
SHA512826671dbdd4f48759120843e202ecdfeb00d39fc51a6466c5a99e9c2df99ecd9a10e79cdb01776a946ddc76e399d25aa2e2bf2599fb4ae7a0a9bf38e3cc699fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c75cf27a5c0ff94486325196f04daa1
SHA1088f46e993cf33b87b096c83e8e99fd24872e67a
SHA256635c05b1da375ce742dbc2c6066e2a0e2548e41aae386457d56779373c39ec98
SHA512d12e2d09bc9122a6182ed3f4c722285d449a1a8ec07fb3848db177d9c123689f57fef496d858f651961cb575344f3350c064d8902a20bd09ad9af140b0bd9b9d
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a