Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe
-
Size
659KB
-
MD5
ef18fa4495106a68af61c1d0d648ba82
-
SHA1
4b693c53b6894266e5e016253bda958ae7c612a8
-
SHA256
aab0204705447fbf2ab759e57a9baebba3c36ea59799b5a774c9265032f502c5
-
SHA512
bf368e77cf8fdb67fb6221e6020149747bfb85f70691954029cd2e42a5b42f98d344cce682ea4796cff14e0b03fd15ce1390b88d8425a279bc2411de15971447
-
SSDEEP
12288:KVi5h23Ks1mQnWattmsbMVSH05SxQiEQ9jmE56r:KVia3p0RzYa+E
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2604 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\WallpaperStyle = "0" ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\TileWallpaper = "0" ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433056205" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47198181-77D5-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000014467e501c8c4ed3403f3e0e95f5249b018a2c734dd41571649c461eb43d6bc8000000000e8000000002000020000000091a7cdb0cf3474518e51b953ebd028caa5fb25aedaf99506fb54e07d4bac95c200000006c7926b49e1447573405defc3e586b7863a68428d1c1ae61618eb3ba9ec9415140000000dcc8a10e3983ab5e558226aea2a9c467322321a3a567edf2b5aed466142d975372e726d10bf5ed864b341266048e09dcd46de3801572159b3dfe38b6bbf2ed59 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ebaf1be20bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2296 vssvc.exe Token: SeRestorePrivilege 2296 vssvc.exe Token: SeAuditPrivilege 2296 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2924 iexplore.exe 2684 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2604 2160 taskeng.exe 33 PID 2160 wrote to memory of 2604 2160 taskeng.exe 33 PID 2160 wrote to memory of 2604 2160 taskeng.exe 33 PID 2956 wrote to memory of 2924 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 37 PID 2956 wrote to memory of 2924 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 37 PID 2956 wrote to memory of 2924 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 37 PID 2956 wrote to memory of 2924 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 37 PID 2924 wrote to memory of 2752 2924 iexplore.exe 39 PID 2924 wrote to memory of 2752 2924 iexplore.exe 39 PID 2924 wrote to memory of 2752 2924 iexplore.exe 39 PID 2924 wrote to memory of 2752 2924 iexplore.exe 39 PID 2956 wrote to memory of 3000 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 40 PID 2956 wrote to memory of 3000 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 40 PID 2956 wrote to memory of 3000 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 40 PID 2956 wrote to memory of 3000 2956 ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\ef18fa4495106a68af61c1d0d648ba82_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
C:\Windows\system32\taskeng.exetaskeng.exe {5910DB5F-136C-4E8D-9CF2-F4EEE04BD96F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:2604
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a39dfdfb8be0c843b1574bbfed5253f
SHA1508af1849839804ae333d56345eb91acf24b1dd1
SHA256e26782d540faee79efcf044d9be7d3d4a267a736303d9b273201a38f1667307f
SHA512584c3976a0af8fd6c32d82eaa80ebdc0a03e50dd9922a54b6fe13f290e0e6f0689c40ac8a6aad1da353130ad9445b716b5dbb1aed11a3b558106464377c749a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71a4394c28fa5c9266253b748a10d68
SHA1af9575cf8a6bb0a71e7b9e9fc3160fc8d55e7658
SHA2561ac9a5daf05ec974cc5df17f3178f5ad5074bd59f024308f97b4bd0a98107f61
SHA5128f330af0d55e0f7e6afdb8255dce2b1717f19b3a4621bad9199cb0b0a71b43230a95b6b0789055247a57e73770286bd868027bb281f3b27734db111ec047f01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942e5555e367b562962bb02acba83877
SHA14ef28d2b58a312b4ae048db499612a2e8abe7616
SHA256675257c303e119b8e1dc12cdd3392608a8bed52c6e9917b8ea6badb96c0f0196
SHA512c786f5c2c1bcabfe4e93a97c6135b30775af306f8fffca8af7e2e003054e62055b10ce066a33dfccac3aea771e8240712843f831b4c224bf9f81078fa391f8cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853ee5f0af5ea75dd6983d1db52767ab
SHA151025b6d77474ef8e3e5d79bca71c0a871e56258
SHA256035d247328583b8061a341d0c35c876ab7e5c14d521a79daa982fc60c6698aeb
SHA512483aa0f13c1c7e34ac1c4b069364aa6a6191cb414e2e5d729ece4dfd5e49ffceaeb53d9d956498ff2af45d4624aea2e8697944679e8d07b6da5c682aaa6ddcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5311cb3c3fe5eb07bc96ba11dd34a03
SHA1a769534a2ec5d3d084f564cd85a9ffd874701251
SHA256ce5954bde5e28b122be7a4fa5424a07b01595ac3aea7a464fc03bac42d4c2363
SHA512320b07f032b81ce85c393450711a8aac89268d1d480488e4aab67178e210ca04e738392bbd3026f68a33635b345e565e27e900bda5c99e8c36a524aefdab5c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f7090175a2e5be37f879fbc93a3b0d
SHA155e8f48c2c8c319da340f39cfae259909961b54b
SHA25654a06ad07cbdd96e2ebcd50335bf1145421ecf57632d0eb17010e039edb5d9d5
SHA512b1aca7945a2b7b72539193f7af64ee278d71de6c8db3730abaa7848946b244128ee57b50532d7575a0ddd4d055d65142b97d286fe79dd95b623ad730b48a9852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad9965e63e3688b21799726f120b9b8
SHA154e794ef73d2f97ad8e58a3bcb385da37db4ac8f
SHA256708cec832a3bb4e68b4190bae49a05c453f88cde6aa35e8378d4ccbe0ec251a3
SHA512794cddaf3fa7c05052c78511340c1feacda85b8001c998a783760c76cd207ac39849c70924cf4eefdbd1b08cecd02539a6da2f69dc36e7e8f7d3b782cca02eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7dd64d7730e5e73568c032e9906232
SHA1df00941708c176f777e15eafee52ab86a6d419a2
SHA25626d349b457a242c341fea364383f8955611853e5a3c790fdefda54db301ee7ce
SHA5129f83969529a41e70d442e9d284e043939df633c50efcba853a3bc968dd5132a05bf962362256d5cf003299b246b6bc371dad53c47e75b1065aa82ba8de0a0186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa0ad7155b476493c5ead2e0530aaf5
SHA1f5f8280f48d73faa583eaa7ff2d38e19315fb70e
SHA2567b23dd39abf3f76b894a16c7217f481006e7ea356882ddf84e98559736060f74
SHA51227a6113b42792d4d4b9eed7499ae0de0b963a3d17beffdad4a7581937c7bedf69091b46d8b4e444696a5451da56f45ba1e027269f275e6f50d5f4c6a9e579c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd171fbf976cc8827dcd50d7e9bb8620
SHA146e1c0d8d0661a8755c72cc9e765a4dd0442c6e7
SHA256478ded88a6cf3e0fb70e521b8be71fd2e6eef61a7dcf423bfb5d0a8a11942831
SHA512a24fd17f0ab581bdf7b857d3e367e630e4078275cff9ff46312d888dce131d16a1719a0bdd26d04edb74832378cb79eb4730aa728b0da9d08b5c9378a9674135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fe8981e87c73d1fafb8ba9653e9dea
SHA1080ba6b19dbaa79abd765de938303bb04e719f36
SHA2563da71ee0c885e701ddcea165633dafbe028732d5be7617435c85f618d0c4945e
SHA512c4250f3c9b18e59fec1b92f2ff16c552330be877027a597d01414c46d5d7abeb08592b4e7c3317544082db2ab541c0c369cac3d3f3441058533694e5b16f1d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928a9aea88b24c1c99115d88eff5d9d5
SHA1488b4cc8bc4e9d2b93eb98ff8b13660252be2bea
SHA2563d3b3ba2b34db9bb2bd3588341bb1b80eb8e70b9f9e8ababac44aa6943568024
SHA5125f7549315b09dac3cdcd4588efe6321ce595fd68aa3dd0ef10828c10384fbb608e4c8807bdab7945b499452cd18286bfb636ae614f0d7f6321047db78fe8a458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad680b165a8ddfcf05452317793bed97
SHA1c6eee9d213d2a959e8beee58f0dbad21b1801fde
SHA2561bb907fc179e47de3fc86c25861b0af4088eac43fa928a10b2c7e86ba4683fdf
SHA512a29263cb0815a460cebe53ba859288f0653a3e0f8a991ae30aea2f5d16d4ee6622dbcccc8c178ef28dd54476d0480d462afd2d680e7d7c6c9268d72d2b8941b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.3MB
MD5c0c663afd0ddf2184a10a6d6914c8880
SHA1479b3b87da28d4fa128e71ee329fb91b1bfbe52b
SHA256df6508e1a3b2895ceed8dd3e2bf439cf33615b23077da2999e6b3b13513cd171
SHA5124f85ea413cb7fce14950bda0e8b61a6b5432bc7b82bb9babf6a89cc4df27042df9ebae59b298cb27c6cc0622d3506ecc970288ef296caff3f166974c1363ce26
-
Filesize
8KB
MD55d344bfea5918fa23ccd697477e8a08d
SHA140b78f9b30765365c4a7a8c4b5acbcf3f539eccc
SHA256689be26c855d9e60610037768558d460a9e39a007db8a396b2d7f459fe2b1eaa
SHA5121a8edf63617a2f1d3fc905a8840728938e162be28271c21e2664d9ab34690fedb38234ecb4510a19eddc393eab99cc53c6852a191c403025ff5912ef7f11e3da