Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
92a7b145740baf59fc3051a57b772d9e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
92a7b145740baf59fc3051a57b772d9e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
92a7b145740baf59fc3051a57b772d9e_JaffaCakes118.html
-
Size
155KB
-
MD5
92a7b145740baf59fc3051a57b772d9e
-
SHA1
80aca6f48a95764bdd212e36176dd3e1e499221c
-
SHA256
4b013c12b22bc3f526961ccf3697ac185d35abed11a2c103c182e22b2d0174ed
-
SHA512
57420de9ed7acc6d2fb6d809f4d4b698e4b2802bae36a24f1e0e720e36c37da3a7872fda847f0d856b1eae4e6fbb80b32e968a7c3bcc53a53fc8c97ae1b0f7f8
-
SSDEEP
1536:iMRT3cu0PTBs6q7dyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iO4Tq7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1208 svchost.exe 2972 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 IEXPLORE.EXE 1208 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000016cc9-430.dat upx behavioral1/memory/1208-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1208-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2972-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2972-448-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px455A.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438585893" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15424251-AA20-11EF-BA1B-C670A0C1054F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2972 DesktopLayer.exe 2972 DesktopLayer.exe 2972 DesktopLayer.exe 2972 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2876 iexplore.exe 2876 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2316 wrote to memory of 1208 2316 IEXPLORE.EXE 35 PID 2316 wrote to memory of 1208 2316 IEXPLORE.EXE 35 PID 2316 wrote to memory of 1208 2316 IEXPLORE.EXE 35 PID 2316 wrote to memory of 1208 2316 IEXPLORE.EXE 35 PID 1208 wrote to memory of 2972 1208 svchost.exe 36 PID 1208 wrote to memory of 2972 1208 svchost.exe 36 PID 1208 wrote to memory of 2972 1208 svchost.exe 36 PID 1208 wrote to memory of 2972 1208 svchost.exe 36 PID 2972 wrote to memory of 2324 2972 DesktopLayer.exe 37 PID 2972 wrote to memory of 2324 2972 DesktopLayer.exe 37 PID 2972 wrote to memory of 2324 2972 DesktopLayer.exe 37 PID 2972 wrote to memory of 2324 2972 DesktopLayer.exe 37 PID 2876 wrote to memory of 1712 2876 iexplore.exe 38 PID 2876 wrote to memory of 1712 2876 iexplore.exe 38 PID 2876 wrote to memory of 1712 2876 iexplore.exe 38 PID 2876 wrote to memory of 1712 2876 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92a7b145740baf59fc3051a57b772d9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2324
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275471 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3558646994373bde8934b999e6bc12
SHA11bc69f7ef49daee6b503342e604d4862fc319071
SHA256540dceae08c6263fa434728d9b882169a284a561853f6b27891646cb55c665b7
SHA512b0d588c13701d72de8514189472d9dd7e8e5174ce77ac017f0dd082cd813c5a75d9756ad8c105aa75715fd455ad9e2adb34519f68c49bc64cf1be2e7f6b46cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581de14cb21932ecc40a01f341edfffd9
SHA1da6067eac75b7f689578b690724a4b546be52bef
SHA2564ac15f0802289601b49048138266da22b7a3f5e0e98ca784eebb670d6d32c601
SHA51268813ceccdc856132f63c61f001cd7a00983b919e493c899e88035093496c4720d1cb494f20c64066bedd5991f785f594c8b6c80e4ec1fe69caad75d20a48337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754cafcd5f31365c66453b4397403d5d
SHA1d59a76e19fad9e2bd8fba8cc05a4a9168507cf10
SHA25605f99e858b47fdac3551d2ca630054f53576da386567ee98e6301719bd65de94
SHA5125388b35415291420353960a7c988c92a729336bc109bd159ffbba368b13fbf556bd61882d7f188c74caa825b1c2f50865bd50f9b3508e12d1f3a03f04beecadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6846836f2ed56e651c611f130379d2
SHA102e8d61453bb837d7dbf5794cfbbc44f491cc00a
SHA256a3a5877b2b7601a0b144e3b1ac6818a95dc25c33e219c549dd06ac53eecc1a2d
SHA512054f164ea1bb6282f43ebd6a749024e05beaf61d2601e0d3fb1283db1dcebcf1d18366ab027594c2f9336e8a153bb51ed5bf0eede13b136bdc0581db862007ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052f3b72529e78b236d84dffefa116eb
SHA194caa02d54b9ba29c7614cdca7ac63abb0eaf41c
SHA25645f3151815b8999fe5413c10ecd3bb593143c9a43445377025c854c497763594
SHA51294d486ca0fdb4bb3b594056b924334cfa18c7afcb5259b8173d1e90913b482f039804083820561ee3b68a97da1ffe18d9abd175de7adf75e98afd5fc6c4c72be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7270b2f9e49fe81b675676cca2b682e
SHA156261353abe1cfacfc649cb5107184cf84657df6
SHA256b8361356dc98d867394fa59fdf50c4df3ba1539535658c5b1d7f1ec47e06f27f
SHA5125d2623bdb3a61959e1ee9abe059d0843aaa7216cb1136b69f6e5c92d67ed8dbdfa74e1ec014bfae26c252254a4b4f4b8af36c1ff7420c58c74763606c54a5fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec3ce0002dc1ecdf431db475bc892c3
SHA1e2671534a274bfe71f2a858f488ccb19bf0db69d
SHA256bc0fa0ba80d7d681f6d1ed96f0f5599b4e4a81770692d9019e67edf9bff503c8
SHA5126880b51ee86ee428548a54c08643f38eda035ca6732668f25425d6a62a776c86e0ae13e6f496d177048230594c4d918c659e8dc65f8028e691315bbbca3fb9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e14fc6c2c75033c4809265b28a1fe74
SHA146aa6102a6a165a2d38b16e2897d526c78e86135
SHA2566749a91bfb6828fcbc4cf60e3189e91a00d3704d875e644c571307abb341864a
SHA512ad5e5c12e344d26ccb854f6990c1265e7a2437b4afcbff7026641a3a85301bcee26513e42afbe13112f71df279d804f2202abf1a2403674ab8be429ce204e33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591be189bb9e41f59b7e178b47e09b80b
SHA103218a23189b50b014798a891d51d41a14f7bb80
SHA256c1b579c2a032213dc39489c875c6aed56a83a0091ac70f87216910aa0d7e46ff
SHA51204f1503be4d084453510974ea28518d7516354503b72a38596ef51a6738edbb327695b1a80dd2222057051ce28098d2c43158a97680347a1a60a3987ea54763e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529270f7136ecbad0217f661b2b1f2ea3
SHA11942695e2028cc303822de4b0e32f48ef10615c4
SHA2564ccf08d9ce7bd09c13468a5b80289d7f82be6a177f620ff0b123a85cfb7b2ca6
SHA512c00946e546e0f413b5457ffb7a194809ce0584a8bea28c21f6f0e78f35fc468367c42260bf2cc9761ac28f62ee0ef12012e09b577d330da1d0837ee0d00ee3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50db9794f0d5a0fa124d43f18b25314
SHA133e8f65e051a14a38dd91501b1c5e53c0c44155a
SHA256b385ad610a939076863eba1d7daa8ef93cf2495bf3e60c578584219902ad7f92
SHA51221daee9a949b3404d5cd508677c920fdadd327d3db48c62d43fbef0476a64880c837463d8ffebfdb3491a3cea533ad05068b7c0a354a34eb364e3372c67199a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0eb40f36bc04813226f739427f38e7
SHA1c628f205441b631d2d7ffda70458e8c5b40f1327
SHA256732ed6b49822f95258164ac89f2784b8e6b1f6e2a567fd9bc76877b93b32a127
SHA51238f514dcc9b268eff4eec219bb3b3dfdbb58e15385e8eb2a6616db0245042e3844143108ad569779339abee17273deebf76bc89b14145e8e35a65c91e1320292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e6affa891c32cc47640ec4f97be6c2
SHA131cfca658773b8e6b58f1c00046bebe508367803
SHA256515c0b7435e082c5fb850d8d8d8dcf2530080d3b24e6721d6674a9099d18d918
SHA512964afa1a57a41fd3140b369a582cb16768ca937bdba13c4058158ec1a608d547be5582d03092bd2f1892902089b8d339355fab773763eea92d7d0502767a6aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441dd1d8be518944ccec116b6064262f
SHA18e50608a830ae279d92f9215e54bf7ca8156d14e
SHA2569e844ed21778bddaf19d47bbe90be1506b2469006623ae1e4e17410f4d346006
SHA512f1d58974ae653370b4cc906727a5cff14c7655b725ab72dbfa0b4b461ba19dd21eb3baef1a39b353a491fa4b8fdf85bc2dccab853e2284cff0893e268c0ed3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407b76dbc9c9a1b981f233685a0ecf7e
SHA165012c1c282f77dcec21a2ee698ef58758fd12d4
SHA256851475c232ef2071dc595411716a49ce734417e2d1a2f8b668451a62900b6f01
SHA512d16d33451d990aa431c88b819f2c5f68639217822e6cf06911ce10cb60ffd2929c642dd6944928162298767adbbd084114df4d27617c715bb8df464b77b536fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507bfef5a17293a3004dd6e56c582d6cb
SHA1fc88a03617cb190ace2c2a5a69f207b5f757d4db
SHA2565be98b5bc53383e987b6c6225d5e17ad47fef3bbb2fd25fb70265037e74a3a0b
SHA512b742c9380a05da105f45bf9cad6d60f547d2b5019f75ad206113ac8eefc9268158e8f512435802c2e2affeb7eb71ee1dc0e6b8cd7dc71010ede62215c131a011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6b2d86d8e539fba90977a26599a8ff
SHA1ddb09ef5ca020cf4b3f6058cb59562c2bfe89d54
SHA2565dfd7f19a8dabb75150d9c2070af17608e6fb660d18a293f20749c0c3910b077
SHA5129a2d3b51565e9c6311bd0aac213e95e0e0d6c32f85b29303b790015991aa5e16742f82bce254285eb9f90b3fabf89690909345b73d0081ff819be3a1667921d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba812457296c54a4163d34d3309ab5d
SHA186c9bf92633e536c52f5db9a4cfe77bff2d68a3a
SHA256722a4cd9f60d418918ee8aea252c2e20cd43c470665d0785660373ffef7f149a
SHA512f08fc8ced4069233d78e39f961b0f9207c6f0165430a2ffe8f0948e57cd338eb4b5f5603491e7331f04719a2cdf48558eb1da4668e9a8bf1af541e91e0f15d8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a