Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
dba4b978574ef94b1515d16bdfdfc83d_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dba4b978574ef94b1515d16bdfdfc83d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
dba4b978574ef94b1515d16bdfdfc83d_JaffaCakes118.html
-
Size
158KB
-
MD5
dba4b978574ef94b1515d16bdfdfc83d
-
SHA1
2862a8654c01d207667e42135317836842b3c4aa
-
SHA256
59feace1d2b876bcb2dffd0f5cb9f84df0c29f856f118f2c5f78be544e62b923
-
SHA512
0414174e93ee4878d1c1c2e1c889475d1708d567da8eab463a097d2c242c3fb16ef9bbec89c5e082b01e1ebf33494663aea4533e88b687cf13e00356e50c642d
-
SSDEEP
3072:iD8F987M+yfkMY+BES09JXAnyrZalI+YQ:iw87MbsMYod+X3oI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1724 svchost.exe 2140 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 IEXPLORE.EXE 1724 svchost.exe -
resource yara_rule behavioral1/files/0x002d00000001946b-430.dat upx behavioral1/memory/2140-450-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2140-452-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2140-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2140-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2140-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1724-444-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1724-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1724-434-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px7EE0.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57DEBA11-B675-11EF-A5B7-F2BD923EC178} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439941926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2140 DesktopLayer.exe 2140 DesktopLayer.exe 2140 DesktopLayer.exe 2140 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2420 iexplore.exe 2420 iexplore.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2372 2420 iexplore.exe 30 PID 2420 wrote to memory of 2372 2420 iexplore.exe 30 PID 2420 wrote to memory of 2372 2420 iexplore.exe 30 PID 2420 wrote to memory of 2372 2420 iexplore.exe 30 PID 2372 wrote to memory of 1724 2372 IEXPLORE.EXE 35 PID 2372 wrote to memory of 1724 2372 IEXPLORE.EXE 35 PID 2372 wrote to memory of 1724 2372 IEXPLORE.EXE 35 PID 2372 wrote to memory of 1724 2372 IEXPLORE.EXE 35 PID 1724 wrote to memory of 2140 1724 svchost.exe 36 PID 1724 wrote to memory of 2140 1724 svchost.exe 36 PID 1724 wrote to memory of 2140 1724 svchost.exe 36 PID 1724 wrote to memory of 2140 1724 svchost.exe 36 PID 2140 wrote to memory of 2984 2140 DesktopLayer.exe 37 PID 2140 wrote to memory of 2984 2140 DesktopLayer.exe 37 PID 2140 wrote to memory of 2984 2140 DesktopLayer.exe 37 PID 2140 wrote to memory of 2984 2140 DesktopLayer.exe 37 PID 2420 wrote to memory of 2000 2420 iexplore.exe 38 PID 2420 wrote to memory of 2000 2420 iexplore.exe 38 PID 2420 wrote to memory of 2000 2420 iexplore.exe 38 PID 2420 wrote to memory of 2000 2420 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dba4b978574ef94b1515d16bdfdfc83d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2984
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:537615 /prefetch:22⤵
- System Location Discovery: System Language Discovery
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c691a1c6c810df0d635f2f3be4e818
SHA1bafd10169ef2f08b04a56de17a478f577d17d958
SHA2562f67b02cae864bed113aacba9fe2fd38c9b272c790a32080c696f3c86cac32a2
SHA5120c76473ceec75655d873d2f32ac2e308ac0478713160107a030917c86c42fb43f47c0c011368db5305cb1571c17e677928e8122d947dbea728c71aff2ece3260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f61707bb5965d3c493a7a416e20c65
SHA181c3d274e9dafe9c468702c8e166ac77a76bba2d
SHA2568083cef20861dd04f616d2993ec7e1cc19a41461ba9cf2ccbcffa16abd24b0ca
SHA512df94652cc48abe422abaa0446767ef8640c8650eb360e1a3e987492cb0c8dbf8458730fec634327ea6e776a4be78d721065ce42323c251d416bf78a9a3109bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b80b067110e9854e4d51a4762c9a1e
SHA1b082e540decc397a4236682215e1d3e2a9711a63
SHA256231cbb3b5da829834a2b40bddc39563c0f123298fbc8ecbc628fe87a6042bf53
SHA512eeb6222371e83488074e1051d6b047f8a2a30113a4f0a927c24a973c048a340c594ef333baa092b936eea8a7b1c1549f0ed88971e003b9daf9ba25f8884960e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62813eaf7903dee58e138d886a6fad6
SHA19f8e43730f0eed0b397aeeaac33ca2ff0daeb42b
SHA256bf47c2b2cc87f394a2644b6f36f298a3430ecaf012d141d8fe6e73bc5442a7b8
SHA51225e2b4d8c8acdfc7e55714f270187b5485b244c744cf84617dba45335c18bd81a9f045fe80491c41faaf4bf35dfc39a00a4618d2b54667712d93709742e71653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa5d33b48c71cee2ef660605fd13ed4
SHA1708ee273975961344dee229a26521b0cb2c612c2
SHA2566c1d219b0eaceba73e2f88dbc2e5696bb3ffd9830092675affd7c6961a87846e
SHA51202b69050dc5ad7445abd9ff8daa237d078ec26c70e1350c9b5c014f8403c9c7187a252816f2b367b98b0595788422cadb4b20adfa8818bd59767da8468a33115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a99062c7698de32a5dd9ed482347b1
SHA1081003eae907c06059c0ae7fec5cf7c533fed430
SHA256181ff28c9b0556257e3a2773a7ca2473d15513ed0fc7b2e29411f6c627e80caa
SHA5122dfdf65236694222eb21091186d1699e2b2dd3c167eeac61929737be1fc6424475ae24df1441a511a2236d22478c6e055c6550b150f8e32b3525469f88fc7382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ad23d9769950d82697b5f04c7fa771
SHA1eb8110243b03a199b46109e89520ef93bda4538d
SHA2569c904cdf7dd7db5df078f8d44228d9aad6783044965ca8dd48fcab3509055752
SHA5122aea9f5aa8e10150a8963ec4e80a807dadc9901ae8e232ebfc26376ea6012a4e7d2c064829ecae8aba9a0fe73bd6210c4f597cc8d778fd08d6959a636f3008ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530584cfc848259c90d6b598b9a4dc2a7
SHA118bc2dccb3cf1aac0c37e938f053cf17db0e5c15
SHA256b0bf7699523c668a7bf13471351545ba36d7013e2c62b7c8a77f821620b30925
SHA5128f77eefd8e15846b742a8731cfe6fb2338e8139149e6e02724ac14727471d9eecee64c9eb1e1c5c0a58aa7e39af240a35d820ff80d792bcda5deaca6bfeadd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c3c4dd4745ed1cfcfc60cf54c86bb7
SHA1a026636a740cbc72d0802886c8778bd8a139530f
SHA256d991d402b74a358b8fd075bf8265fce06101183995bea23286ddbde94a204933
SHA5123ba1e9eee6bd5373fdaa001740059486f505db3dc37ca17a6d5fe8d4e4771b2701c9b5e7900f36289ad0e3cfa7f7a94f2023d4a2398f0c4e66c00799d48775fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b66532885a83837a22a18f02e725ae
SHA15b9a82c06d0746a6a619a37fea8a3ee1a6f26db4
SHA256796879efcc111b082f90a923d307bd33b207eb005b637ebad7d9c3131a822eba
SHA512e7adbb9b6a59284f670629cd650d1d9fa936ee76f7adc25310202f611d244126ccf6c9c1d4bb201f5c30eebfb8c9b78797cf90234f7e12428cb1d308ed44e679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597b11877dd4f5f570386de892444726
SHA18cd37cba3fc484ab54c053472a6c7607019ec05f
SHA256ce0fde53fb59eea07c5fb54284367c7cc6e55a396073c5515a51aaa2454c7de4
SHA512f786e7f6d139178650b616f1163746e28b7c15c3e40c8a3cf20cf11c31f944787b26bee6765cef612f81d03c9e5d8e00c525bee8850f4e69037c94bb3b77797f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e483b67cfe13709f70585197bc811e1f
SHA109502edc7e227625989a26a30c36f0b2e67c2e47
SHA2567f2b30ad40c7fe34f641e9e4ecc911ef8d860d785b73148425c4a83fb33511bd
SHA5128af3b08867556c21c2c394f954cd5f54346e43a7c04e49e02dbc40e30824dba3a85316788e6afaad6e5e1566d70ec223f79dc45953b47658c3ee21641c896d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea714ce9480acaf7ee573f164a1456a2
SHA12f5c5583b5f37d19e5ee23bb6f44c3a6233c6927
SHA25650eb40bfad105a7d50f1cfa8d1edd17c8bae4999f71f5f1322e253796c5282cf
SHA512737c519ac7d11fd1d73591af1ef7aada38a47f0ca646105165c637b85e3e80411a8e2d0b7cac8fe227e2c03058b5a457994e7833e62295769c2b918efba2466c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738b8d1d86bce4daa84cb419f9164f06
SHA15a1aa5a6318ce43b65b3697f0968a49b1b4cd2ac
SHA256c476a6974a1a267109dd89ed41c021f7e6294fb752ecb11223c0fca09499a8d5
SHA512415716f7d6422366e88b7984203f01b90506771558d237ede8bd1620fbd4aad3adf58be0cd19167ce24a866ac735e4993c3193335c99bdd3a89785e37d6753d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49a9831fb6ef6cf98544c6f4b74bd50
SHA1680922cbe8e694c7e37edf554e6f42f33adc64ba
SHA2563114b53aa7d4d5c13dfeb58c7cabae23bd53c0f2fe9b49fd8844e85c5035681c
SHA512ca5c44d481f4834ebd533f49e850caf21fc1bd22c2bba17bb9ce857fca1df9c585a1f7addbdfd1af582f984539d39b9cb78187bb68e1bd1c42d34369aae21346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb87b474f29a0b68d13c469ccd4b491
SHA15ce1c2ea766143337442f595e77e79d0ffd9f4f8
SHA2567abdb45a918bd602a864a4c87f1c1723eaaaa01307a93522345a6321c36908b1
SHA512533998a310233e363c3bcf3ca33a82fefba635f32c54920fc4651875b2b00c3c5fa3461edc68c42a6da209c53e3ceeb438254da1803ef8ea129b1caac99ee2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f04e2e92126d9ed1cf30f433058704
SHA15c6ca6f6610e3f59f85c44efbc1c1a8e5ad20df5
SHA256d9180d49b027ef83066424411ef8d7ba628d2ad6d908acea79c102e00d565aab
SHA512d0def36d3d7db6ecb5696e1f83dcbb6ad712f8ac7ddd0c62da39fdc2034cf4447fdb344805f303fe9b53dfec5add4b9e011c102418dbb041fe4b2cd0e5e188b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f48501b9134946dfe2b121eba83343
SHA11d6fed67de47d80046829cc17fb547e7a17356f6
SHA2565e73b4ca85c7572c9432a3671865a64952cae5458cf55666aa9e6f266c49eb3f
SHA512882decf02dd3388c7cce92582eb7ccd7d46c9b35e214e5a85ff8ce19c9e4cf8fc12c791a36282a582995263ec2076dd7215f4d4361504e3f55a2547b631cab90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21ab2981e75ef29f8e77eb7b9a943af
SHA15200e894d42fb5dd6bd3190cf513a26cfa387bf3
SHA256038709d6addbecc4a6b6e3b8c2eb75524702e5799ae0885b06a4eda0f5e152d8
SHA51205ea9790fdd10c0c78cde1d4674e5ebff0996103788d389ff54988cbf30d6c4996cd2183991a718f91752fef8d6bdaa44f7c835f2fbb3c399a35a0d9b680d96c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a