Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
917698d870dc8d2493494fc8002c61bf_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
917698d870dc8d2493494fc8002c61bf_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
917698d870dc8d2493494fc8002c61bf_JaffaCakes118.html
-
Size
155KB
-
MD5
917698d870dc8d2493494fc8002c61bf
-
SHA1
bbd85746a4fe0f1013dd09f165501f00d091e8c0
-
SHA256
19e864bf92273dbfdc3367ac63d7d96a81e5ca42df6b3963db91e5cfba3e6fb2
-
SHA512
788cb08f884404342ab854faea98452d9c7b7461efad3bf63f58c527a6857ed6ee2efa95a33a4980c7c2584b1fd94900c16bc14cc9ce4d2e4a570a499e1199ce
-
SSDEEP
1536:imRTKI99YyVsWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iMPSWyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2404 svchost.exe 2312 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1880 IEXPLORE.EXE 2404 svchost.exe -
resource yara_rule behavioral1/files/0x0030000000017497-430.dat upx behavioral1/memory/2404-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2404-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2312-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2312-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAC65.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{591F9BD1-A9F8-11EF-9D85-5E63E904F626} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438568827" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2312 DesktopLayer.exe 2312 DesktopLayer.exe 2312 DesktopLayer.exe 2312 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1972 iexplore.exe 1972 iexplore.exe 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1880 1972 iexplore.exe 30 PID 1972 wrote to memory of 1880 1972 iexplore.exe 30 PID 1972 wrote to memory of 1880 1972 iexplore.exe 30 PID 1972 wrote to memory of 1880 1972 iexplore.exe 30 PID 1880 wrote to memory of 2404 1880 IEXPLORE.EXE 35 PID 1880 wrote to memory of 2404 1880 IEXPLORE.EXE 35 PID 1880 wrote to memory of 2404 1880 IEXPLORE.EXE 35 PID 1880 wrote to memory of 2404 1880 IEXPLORE.EXE 35 PID 2404 wrote to memory of 2312 2404 svchost.exe 36 PID 2404 wrote to memory of 2312 2404 svchost.exe 36 PID 2404 wrote to memory of 2312 2404 svchost.exe 36 PID 2404 wrote to memory of 2312 2404 svchost.exe 36 PID 2312 wrote to memory of 696 2312 DesktopLayer.exe 37 PID 2312 wrote to memory of 696 2312 DesktopLayer.exe 37 PID 2312 wrote to memory of 696 2312 DesktopLayer.exe 37 PID 2312 wrote to memory of 696 2312 DesktopLayer.exe 37 PID 1972 wrote to memory of 876 1972 iexplore.exe 38 PID 1972 wrote to memory of 876 1972 iexplore.exe 38 PID 1972 wrote to memory of 876 1972 iexplore.exe 38 PID 1972 wrote to memory of 876 1972 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\917698d870dc8d2493494fc8002c61bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:696
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:603142 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c30f87bd80bbb719a7142d90a8cf1dd
SHA1e776cb8ae4befa3eb413dc97a0697ca507192e38
SHA2563e452a860da048c9fa25bc83d4be4a43ef5329c56123454f6a25ead4c98b30f5
SHA51230f701c5588f6c83f622de466ad283466f905fe9ff8015351aeaffd02ea8ba2ab6fb45fb0938f042106ee8a4368f2e791d6a652b96106ce5b20fa7580f9f6029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a123e2e8251e48c23524d7841d90d927
SHA1c96f4348c60bc38f77fc14814361dae66526581d
SHA256b311acace27db5da6ecf2c28a280b4bb1871a161b8f21f6db8433eb19e2cbfb2
SHA512b8f3f31a432ee52b0ea61f766c8f17708787d6c7ec9edaecd8935321f67c452b0c3543060ddd9eba265ac5c0c9dc35d83d0ba8da70b3e1255d221752ba9d00c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524185b4a86a8510f7544a168e44b07ce
SHA144d9e8f66b7d66fc16991c458c8bde8956ad0ba5
SHA256cd2aaa14e82e2ccead142e5bdc36e5d90809aa04e84c7133d28d5b464755c461
SHA512152d8c9d94f5a1ca255e6c83af6bea0479645d23e82cc90347875031ecae7e4fda558d6eaa21f1d1d2edd00f65ac29f1388b35a48672478c5a338fb04d2c25c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279aa1791da0b5bb0a187197ce1bb76d
SHA1b81400e4372bdfb00b9c4a0a2aad0f3ef5663f0a
SHA2560052fb80a0735c71efa0a2c8cc7463342c4dac112bb0e46a25e532e335f72389
SHA512221dc2e954283915db754690b4c9db7339c0b75888db96c3ed32a9bdc6f6afab118936b83c7665aec56c4361edea07c38f2271c3d6ef861062d5df3207d85348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342f989c08e63e411f4b31269e8d9929
SHA1b7902a0d83ff74dc95d25747a1ba175b7a75fb71
SHA256a16caa5a1fe0241a393a3fe128c6976762e187f2187bc285a9adb680f495bd71
SHA512fa6580adad7313fb095a662043a19295178f1f9a86619fb29ddbf8af0f9fd2d7d019ceb910821bac01745f04bb3aca7dc0b78c0c4b30ffc5a0aa564248bbe1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa39997681c44711f3757244e5dea957
SHA1677f94783a6ea36359ec1f0193796d76ceb1f449
SHA2565fbf5a46a38be09cd1c91d7ea41322724eb994f8c7d6476c956324c4fcdcf418
SHA5124c42cfcba7271529a946f6109e7531b78cf6f490a38ea8a7a036869bcf50dc8aae23d8b011ebc30ed2ffad2a39fa40b2ef7a7da5a871169a2252e5a1768edac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566477cf9b07e73c578ea21a0136100a1
SHA193be519b5f2c2fecff738ef112feea6c2fb8b1c0
SHA256109f554ea0f89ad0d4daf4182d875c80ff0bae47b965da597b3cb2e874406333
SHA512a028607185d0655e7ca635125b530ad0a9a94d68fea2d1ef31204698b5a92c69e3442bcaa12eefe8b65a1e943558ec7ebe9e4ca02b672ce7035527ca097f5481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be9d0faa5f11e68589f612ca355791a
SHA1990b55be7361f251bf0b448954725ec91635b7cd
SHA256f5d7b8c84d030fe866380929debe192fb4b2816250d4e5863e323f3c085868e0
SHA512c9b1445e4c9772611804d07533f4e027a4639fd2fb068fcbe2ddc95a76a8c65ec3c2ffd19863b7bfbce7e5d78c17f9ddc339f36a4341b785dece41521d217070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506395352d5d93907b733515f7630acd4
SHA1f748c2d7a173e7c41ed2e846f6ebe57d3c85369f
SHA256a5a11e65d89fda61a27753b7068d2abf4693f9454eef5a023fb9be1eb4bb6905
SHA51286e561deb8b9f83de26cb0fd7021903cf8d404d3fa85ae4e9275e318f7a48b404f119ea932e088798f67171259ca0730e76d65afb288af3883d12a7dbdebd028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cca494ef3b121257ebbbcf71e687459
SHA1ba9cde1aaa2c4151e2b13b2ce25962f7f1e68db3
SHA256aff1bd7ea6dc0f69a5262c6b16841d69f38262c8aea7c19be3131a2a0e37f04f
SHA512cbf9bec1f317786e80a1173675aa0cd05aef2e4aa027e278b80829e3fe606ef251028e2636eb0a9293adc2be253ff2b52191705b333318c20cbd2f5137d1efe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa18d80205a3d9adc5eaf5726517ae
SHA104525a293363c4ec4ac09493c443a9b95660fb35
SHA25621744474af10c28c0a01467a98bdd792c2cf4853f6ced87cb794f877e1faefac
SHA5121cd4a259faa6e5a408aaab8d6f52a52c0f2027018cf7cd39847ef03ca265fc9c5977f4c702504f92f7b004345c173430a0bf29722a032060bc4b8ca9fa4c3fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55785068d560c98ae23ae4e945ac98cee
SHA17e158325969da1351e87fcf15faf6fe1c2229839
SHA256916ac28db24f1be9de0eca4cc25dc63f3b7efee4915321005a1dbc8638d89bc6
SHA51223a8943dd64ef1dccf125b096feafa438a46b2671a92234949771b3182981246b7f20bdc4cb0fbb28a011621e2cd5b10a7824d03a54177bd87942208b0ff3eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59087691e60b48a0500013dab05f8930b
SHA1a1c6861411815420c300b6f01c553f165848511c
SHA25616fb477d28965cc2904e75f77c6abb62a37a7459ec618ba0c9a7dbf4c197f4e9
SHA5120192545ee46f796e51dfabf42f6ea6d36e9841a4e21c7d831265c16f49ddc30268dc78687687bce0ec92898f35457573e1923960f248a46b7de51d7f687e9830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f567b638055563e6532b4d79290d990
SHA175fc19b7b4e317de540190c6473a89ebf5323129
SHA25678f97b8a582862f7d5f64ff3641301a9e8e29dc600f623f68f27c6d00b646c9a
SHA512a9022dabd432450027955c1dd240f23b99d86b0d51720bdab056ae5cb38bd749158e7885ef20c13951df45d239ec2c69f3cb14aff09fd2cfa53e04c9f782db2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c638723401856bc214d459e4603272
SHA1330ca545e77ebf56286a6368376742f7c3686dcb
SHA256a0cd99f27f6cfaa26b217a0c0dcc72be2ba9b2fea08c0d07c66781cea8f3a89c
SHA512dd5147cf11377a5d5d9984696bb51e6aa40d00e98ada12c8186378f15899bd778c00e2234922ea3e95d6e2d7770e3f93877baa7f8df4d24557db48810802b9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84203999e783465cc7ad88e33f00f94
SHA1f83e12a1c96b94476e78cfd56ad5d53852138f38
SHA2563358225e8a988925fd1d72a69aa0ebad97427233197a4b2a36394f67a52765b3
SHA512d1b5e6f6e8f64a1cb49dce58a62e3487f7613c7ad7c89336e4a5c0c6f319daef50dbdc6eec094849a7eb9820788808e880920d3e2f7b5fba9e566d8876393316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd749b099955c526d7149586df341ec
SHA161a2253e66f275a1baa214ad0ce0f3e509ce5253
SHA2565ce3dbff12e0c989910a357882124b8fe904c62241bc14be97cf3cdb7e4eecc5
SHA512aec9c792a9ac50ac22ad7158542a7a008f04d2840903444633823555897fb93101233a2b27be5737d37bfcec6489e6c96e86dd4cbc7a505d9f6c43a9c0f02498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58919611ec52783c8dd859450f9ed136b
SHA1a389d063041a26c13a74ac806ef923f6e9e1f5d7
SHA256a935e4545e3df296b24f5c1ee892b67ee92a0f9ce2a262ecaf79db4dca9d3ed4
SHA5124fb54592eb8e691ed70857eb0264d566f9fe0a0e77861f13710f0d46258cf06bdcdce2a47753f7328298dd5fb68a771bd5e3872999aea69850e5d3e866ead7e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a