Analysis
-
max time kernel
128s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
027d7f4eb8a8a198aeea6693fa82d269_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
027d7f4eb8a8a198aeea6693fa82d269_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
027d7f4eb8a8a198aeea6693fa82d269_JaffaCakes118.html
-
Size
155KB
-
MD5
027d7f4eb8a8a198aeea6693fa82d269
-
SHA1
95d02ba13f82ea87630b08d36248ae85b4630a34
-
SHA256
e693766f471eaf9e99ffe65fedf26136fdcf44453cd5175780ff5d9d69b8fa73
-
SHA512
ada803a0ae957daede2c26eccff2a9439014ac1d25c1302b4f8000a1f5e18e96497505077fc434c5c85ef9ade0fd38452d2ba3a5f7921f4bf6f0fcd34d77643b
-
SSDEEP
1536:i8DXRTHhbxgRofBhcmyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:iAbjcmyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1476 svchost.exe 2208 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 IEXPLORE.EXE 1476 svchost.exe -
resource yara_rule behavioral1/files/0x002e000000017570-430.dat upx behavioral1/memory/1476-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1476-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2208-444-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2208-449-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2208-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px23B6.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDDB7B91-7F51-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433879373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2208 DesktopLayer.exe 2208 DesktopLayer.exe 2208 DesktopLayer.exe 2208 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 1204 iexplore.exe 1204 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2820 1204 iexplore.exe 30 PID 1204 wrote to memory of 2820 1204 iexplore.exe 30 PID 1204 wrote to memory of 2820 1204 iexplore.exe 30 PID 1204 wrote to memory of 2820 1204 iexplore.exe 30 PID 2820 wrote to memory of 1476 2820 IEXPLORE.EXE 35 PID 2820 wrote to memory of 1476 2820 IEXPLORE.EXE 35 PID 2820 wrote to memory of 1476 2820 IEXPLORE.EXE 35 PID 2820 wrote to memory of 1476 2820 IEXPLORE.EXE 35 PID 1476 wrote to memory of 2208 1476 svchost.exe 36 PID 1476 wrote to memory of 2208 1476 svchost.exe 36 PID 1476 wrote to memory of 2208 1476 svchost.exe 36 PID 1476 wrote to memory of 2208 1476 svchost.exe 36 PID 2208 wrote to memory of 1188 2208 DesktopLayer.exe 37 PID 2208 wrote to memory of 1188 2208 DesktopLayer.exe 37 PID 2208 wrote to memory of 1188 2208 DesktopLayer.exe 37 PID 2208 wrote to memory of 1188 2208 DesktopLayer.exe 37 PID 1204 wrote to memory of 3056 1204 iexplore.exe 38 PID 1204 wrote to memory of 3056 1204 iexplore.exe 38 PID 1204 wrote to memory of 3056 1204 iexplore.exe 38 PID 1204 wrote to memory of 3056 1204 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\027d7f4eb8a8a198aeea6693fa82d269_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1188
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:472074 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113476664727e19b5afa328b3fe54c36
SHA17a9971c0894df4fc274a936a2b268f20f90b413f
SHA25660528a5a30410d0d88dfc54d4817f483db13be9db72444f2048ed3bbbb4a8fdd
SHA512942dbcf4d7c47f328d4c9930e94f9bd5c2fe282b3279e44b222edfc3b710223ca14b789e2b00a5afd199c9a99ce3f4b42824f0f59af3dadeef9707e1e0159736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5b1e8c5c57c2709da42bdb1a3371bc
SHA1ea7ca8b9be35b2dc6f3ccce8ce1d4858d6340516
SHA2561d7f5578f62fc224ce64890cc2256f851005da9295b0becf32ddffa72dee156c
SHA512e9b987287d33a0cab7b0fbdb5de199304c120f4e59a463549e7e3e8cb823add449e9133ac942093c2aa2f4893cc5f99bfd4749154a3b746207a1c21de6bca861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81c6f976732e44c027aa854374b6937
SHA1127910b61f8829f644e1ebc72749e1a1b4be8889
SHA25639e93ae4fad48285d6ef692fe1815bf2843bf58e5678960ffb816baaf12d5b1f
SHA51218777537ceeceb0241a2ee97c6149f89029f0f1a7b9fdaf529793c2d12e5897e4a26d7d8fda3d35d51a92fe40f5a32392e786364dbfe1190d6398b8081cfd63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2ec692d69eb6de399710250ba67081
SHA158f3792f96ff081d25b6b67e04f3bd2cf297ea6f
SHA25619fdf5bf76a0b0af1537010d653a27760004de9b6318ea88b0709a0781e423af
SHA512fba7cc99a7d27b0f6dae2d35e37ec35d66e4c72d9c959856d61cef3fbe83e1f1e9a7b781cca573da40186ed1d93eb4d0f6554a4ef8312e01c8848d2d42150e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53446b3cf9afd25d67f4b7de88265b1db
SHA1b3f5a3c4024e2fba40c934ec9475ed06727a19fe
SHA256299bac35aabd15e7f4b02f17d404f9895361d3b2c97446ba0c0e02f01603c442
SHA512f754ed799b6f375eccb55902387f19081072914896e09d151c8330110f7f45e65d9bd54b2bab313bf2b76b0c32840a15094448cd5c7bbf48be7a1bad29b0c0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594bcdf62f1f2e02bec5f406750751db9
SHA1ae3578f05a11915fe49dd209e65a381135fad6cb
SHA2569459d133a3307bca2eaef633d35e357a27133dfdc025c3a76ccfd095aabb2d26
SHA5129109a37db72367850ba994d61cb123b5d8044480728f8f1fc851c8d0c7e0f833e37daae96663082d151d1f5b24b364a7a03094b6b6fccc7c969dd4692a5150aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ba9097ffd94e9d7e77e3229b1cfb99
SHA18c647435cd272ab2e4eef29dea5022de77db4b0d
SHA25684fceacd70bbbff125ed7cfbd511575f3ffffa1af7fcfecf4fa7e45153f21365
SHA512dfce95cf025d5f4877a182ad3a2b15d6f3971cc65a5ab568e05604c040dc2464df6015f36a1090f9721999d33c8bf2405589090f9c7223685b8b7f4b3d4e96e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426e192a6ed2ff0bdbec2cbe1464f47e
SHA12ecaa05ec962d6e611db50a453dbe8f56b2e0684
SHA256b8bac6c8fd7f5cabe6f29bc8a6827a753bbeb4cfd03a6de34c04a760c7dec046
SHA512ec8d85bed7d73b8bc0ad85b824f53678be0a13556dff2a9b0dcb9ee3002888d0ef8c4c3af0c1eb792fb9a1b5845ea6b0449886891a8dc76e018d6ce7afae16d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc87626d83fbbcef4534cef598effa69
SHA14485fec5bb08c28c69c2ea19e23ea906387ac2d4
SHA2563e34ab0630665132418718737f1e3b1b96e02f1c72363ae15972b41b2305b5c8
SHA5127596984bb4c7c090800d7bdff9074ce561cad381ae9cadbb1a3c7b68e0a1a10ba6d485e12b56b7e54f7fef545c61c41acfa5f46d503d51d5ae253241604bcc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8456f8d0a3f26d7166c590b3e33c765
SHA1da750a6719ac653d2bddba4c82f9914846615d36
SHA256506c164743c7d8fd1e1954e5c6390dc0660f5480fef849ea576b3ffb870b1e8c
SHA512656a9f14149b8ac51f18d7e1b179fa81ebb77181f6e2d115469e527253fb27866f442af2f69db974db73f86a0b279800dde18a5a68b0982a1125cf309ac9868c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05f5948d56fea655bc1307e3321950b
SHA12dc07631fe27f3a7485df5c5ad8efca80185694e
SHA256b183621a2478aba7718a312082eae434c99535a2cbad4ed00a1b8b9cabbcc867
SHA512ad0314d484d28c79e049a80a693034e40cdd023eec01df91e8f2600e06cb8b7e09320e94c22d34ca76b38d19284fa3c74f863e9752187eebc266bee864a2152d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50861ce6f6bd7a5f9c8e76513ac579d21
SHA1c5e85c1ba9309d22ea351e3cd8f55808c2efd395
SHA25604ddea5fb6d409cce0e8360f2e1146e79a556f39024ba2ae5c9e0c88a74c9137
SHA5125b18e6cd328577ded05d38a9b130973c1488b4ee7ab39c9de3203cbdc42d2f62cf35301278222ae73566d95c2dc80fe8207e3e769970ba200f86a2b77b6640f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d490ab14555847be898af74143582169
SHA178a2cffe7ed2472390560468f437999396c20e82
SHA256913ff2f411a1f260100a439b7aab860c9480e936a221986305d097935444d0ca
SHA512bf4e1753e3d4ae6d4c2d96db47542dcd51b12c4965c04e1e93711ae176394e84af811d247e5fe6302c63cef27807aff62a2dcfa59f367cf586bb74e672df305a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c08eff27c9d333c0c5c7c39963c4f5
SHA16c4741cd714e52b1547895e7e9c786466e7c7ba2
SHA25661cf2ff587aad68bd4a80dec5f286d52558434ea017fe776642cfb0de0d023de
SHA51277a3c2c3e1cbdea773ea6a62d396a9ba3d72fa13a7674c279094bfe54692a731ab470af1a72aee52d65c471e7c1c1d7bc8800a6029ced84852a8184bfad56853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50557e9deb8edf338c380996b04be7b3f
SHA1bc74c96e91f7a233bb426dac04463e26bd36a0be
SHA2564e9c9b21fb925a3c8a493be743255da8d775c487c0582057a36b662680a576fb
SHA5120566a76e1eabe49af9ba37b5385d5388dfdf79f852a7ee50750e157bc963f96218d956ec1689d0409d17fb64100384fbf3f3c22abfd3f28725cf73b4b5caf024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f977fa17659c990331cf1942491064c8
SHA13002c68cedbe998e5d1169b3fe3960c3989fc986
SHA256bca8cd0b36a125b86142adec58ec1b0cb242d887351943eaeaf5fc7ad759f3e0
SHA512de8cdd6a949576dbf1c258f2e9141c21aedc90e36be1579d294bf3e78ffc01b3abe22a7b8f161c8c7cb54b3d75b9a76b5bf566f369d76bde521382d52dc08e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51388c77e37138b1eee36ac3ac21d938f
SHA180dfb7f8520a3a9e69c0342f5c05f2a28ba65d48
SHA256f44ca4228f2fc453cc4debcba9005e42d24b6caa548b88b390c09952759e1b36
SHA512a0dff6e667b96f6b0b625e9c71e95170f16b3d466abe32bfc370b55a813f0f6732819f3ab7077e40a956c1c00d2f7c2004c6987da7640fc6e60e4a609901c5ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a