Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
d9007dad87a664de4d3bcef8393c0830_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9007dad87a664de4d3bcef8393c0830_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d9007dad87a664de4d3bcef8393c0830_JaffaCakes118.html
-
Size
158KB
-
MD5
d9007dad87a664de4d3bcef8393c0830
-
SHA1
9c44d2ae02f50b62920274f2c45b813883436003
-
SHA256
4c50509a82a166d443916e28b47336397bb4c0849271fe6b77e9f128f6e3ce21
-
SHA512
2b0301622cde3bc9d9706c8adcd9823ad751acfacfaf79008822dbbe90e61a4845631a1e37395548910c96ab32da724c820ad6f9c07e1309ca620e24af8b8b53
-
SSDEEP
1536:idRTwZFzjD1eiSrMWgIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:i7kqoFIyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2736 svchost.exe 1160 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 IEXPLORE.EXE 2736 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000019c3e-430.dat upx behavioral1/memory/2736-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2736-436-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1160-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1160-444-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1160-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxA5D.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F808C3F1-B611-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439899244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1160 DesktopLayer.exe 1160 DesktopLayer.exe 1160 DesktopLayer.exe 1160 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2324 iexplore.exe 2324 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2704 2324 iexplore.exe 30 PID 2324 wrote to memory of 2704 2324 iexplore.exe 30 PID 2324 wrote to memory of 2704 2324 iexplore.exe 30 PID 2324 wrote to memory of 2704 2324 iexplore.exe 30 PID 2704 wrote to memory of 2736 2704 IEXPLORE.EXE 35 PID 2704 wrote to memory of 2736 2704 IEXPLORE.EXE 35 PID 2704 wrote to memory of 2736 2704 IEXPLORE.EXE 35 PID 2704 wrote to memory of 2736 2704 IEXPLORE.EXE 35 PID 2736 wrote to memory of 1160 2736 svchost.exe 36 PID 2736 wrote to memory of 1160 2736 svchost.exe 36 PID 2736 wrote to memory of 1160 2736 svchost.exe 36 PID 2736 wrote to memory of 1160 2736 svchost.exe 36 PID 1160 wrote to memory of 988 1160 DesktopLayer.exe 37 PID 1160 wrote to memory of 988 1160 DesktopLayer.exe 37 PID 1160 wrote to memory of 988 1160 DesktopLayer.exe 37 PID 1160 wrote to memory of 988 1160 DesktopLayer.exe 37 PID 2324 wrote to memory of 2068 2324 iexplore.exe 38 PID 2324 wrote to memory of 2068 2324 iexplore.exe 38 PID 2324 wrote to memory of 2068 2324 iexplore.exe 38 PID 2324 wrote to memory of 2068 2324 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9007dad87a664de4d3bcef8393c0830_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:988
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:603146 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431942c21325b24162f7c644e2ca3f3d
SHA1c047207453e13d62bdb59e10f398fabe6e579525
SHA256f2eaf8cba222cd8572bbac87eb94a01088e8e7484c80b9ca834bb4233cfb4789
SHA5122152cf9d83339d36013f7fe44902a5600a02116754e200f7f276529b4f9cfdf34ed89b8b9fc040ad982392d91d56ab977c90939819b476bde1064995a7907f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a835153055f32da06accc8ad0dbc4ceb
SHA10658b9d3b6257fe6bc01b45db7549e96abfc7267
SHA2563644653c3be7f09d223b6efe5fba8b3c6bd4e0f5ec201c3b3c5a52bebf547c84
SHA512c34cebb10f937010b0dbdc67b1a563dc3f5a72e6190e20a33b2129408e893babcac7a959954c27e4120e16a5d04b90ef42916ff788f480c04308d1f07ec30080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737d82b755803ad3a294914c1c8d703e
SHA10688dca01228ef19f040a6339d29fb8b4e3bfb7b
SHA256b0098d8d5a67c6c0d069a909d3ece3c03d86038322ee7a18ed5bd5f5c161d302
SHA5120513f1b1cc11cc44b94cfd8de43af4ec728b5897779d3ae4b93caa2d50b7223b6f30491b4a867146df51770479a87876ddb5eb5f92b53688a7fa5cf43300d9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53891a12b07bde3f34efe56c991888dd6
SHA18e630321409d900816087e492f6ff0148f7063cc
SHA2560b54e89403c38e4a35be4517b0ab7b88be4280c4c5d8fc4a7d9c064c0a09bb92
SHA51239f2e389fa2899592ca36f7a6bd884fb148324b3c5e958768865064629ec5a0691260136cf3777de621fd551cd247a685d31a05c380775b9c7e0136e85dd1a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57661e3eeee0fadcd28c3ca25d6a6367c
SHA15ee53bb1fb9c4bff8d2a3511155993d76208415d
SHA256395ffe1c70fbb8a3480288aeed7e8022d58f72fb9b405bc5957f96fcf8463ba6
SHA5127d6da1c5b4af855fe5bcf9cc3cbeb99519ffb9ffba5ba0189a41f3ba7184424af42a9d126da8f1aea9b2803137a37486d54478b38a8632c8ebf934580971ccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f547a06919ab60602f9d337e1963f62
SHA13fbbc93d7cc4c4e18dd354df0e26bc09a6e7a72e
SHA2563939e3978f070073801e2872ff4adce0362bd9d40aa730c7438d7b403b1a2c7d
SHA5125bd3709601ca00cf3add09c43e1e8d2d53cf44a869327f356cec0fd5afc20d82964c48ed3a7c15d50335b44cd377e6ea1e6744d536c203d90ca7c04eb5d22d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e294957764f06baf4a2fb4cbc8fd1c
SHA1c0e42034775000bda06cc6c829afb008472665eb
SHA256ccd55059c0083f22daead0ab9f46ba6331dc744643d2e2733e5b84905a1a64ac
SHA51277fed9be2c55a5923e777d4f1a87a3e03b776f65c715d8e112150782b23202e86f66f65b194330ad07478fdf61fa0d4d4661e5b1a38a08be8df13ddc89191b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af5145309a6048074ce40eb69461d2e
SHA1f8fa511b79a6ee5ca9091b5b5b14aa1f96e21256
SHA2563e3cbc4859e0786136f26d37c2ba0f4fc1f7edc77b98c8e2cac4ae18270043ea
SHA51209b0baeeb9978e8e9c2cddbd243ee77fa9eae6bac849d40c1039ccf5b44b7149cb2928a043af109018ccd575fee38199f2ca2dddc88e77ba7dd458ed36c682ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c42d0d97c139426ab02f9fb67beb1b
SHA1d928ca1b9ff2b26b711badeda6817293f3805ae6
SHA2565440d11380baad05adb3c994055e24bfc2c9e0237d74b7fd21ed471051d67839
SHA512395d3db8fc6e7a929cfe3e84ccfec24ad9580678d7725bc3a9a71b0f93cf01ec295b4e3709c33b57cb82ea2b982897d263651dff2fa4c4f3c679f63d6dc307dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1ff7582377b57991d715487a97fdf4
SHA176da73fb284d4cba783d38019a62bdc13234aa00
SHA256d493739086d3c07b19d419fe096541f27959dd113969bf82f57085f0138d9fba
SHA5122b345da6de27b5b97bee7d681a2db91e42afb0ddc2b4623aec312d61f070157f3cc6164625f6613ef498b887714ca04ad1ea845d2b7b4dfdd1e2f0d4a6580f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92e6217af8a003c1e8c408528b2f4a3
SHA10d6cbf5ae3a758a31b1e66affeb2b5d2f48fa17a
SHA25618cf695a77a56ac8f85222c274dd0e74a7f5f88f8b7eb5a14c0ebd23f2e87ace
SHA512fb54c58460c202cf167430b9e8e7c8a6f08f7d8ee3df6af657cfca2ac9506eeabf1a9a3fac4dda1b4d43b860c54645e839b7ec8988efdd4873af0741afc6eef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd6dfc831ba7963eaa4a83e904d4e84
SHA1ea0fd8ab776ee904906ec94acd1841ec3708f7bf
SHA256f735e6f9ed5ffb1f3051807e6765d8bc4bcd6dd1f382dce18428cf021b76ec8e
SHA5124016e33665afd91a07f3a0a73d354ce1fddc03461c61bf493fe9aba1d34d3fa1793c9844e7e3b2f2b705c85c31a9765eafde444677c7d83c8184211deffefc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f4fdc0d9008d4c3427b4bd60a14130
SHA1c4207f7f18d479ad8d0841a4d971152509b116db
SHA256a9e04bd4a220187e331938498e7fc53ebfb085bc9b907c0f49a7c9d070b90e9d
SHA512737ce7076bf675060472d5568e45faa546d061a669f390012736598934659afbe6b24991a9b9fceb9dc809824dc4cab559a3d3bc1e859278c2d9b63250530028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7079c792715c1b5b249f31fa7d2283e
SHA1875650b35b16088ee0e2f85a1e0f4e29d9bf69e3
SHA256838d02f3ac65bf72a30f3fedfe5dddae1cebac171f1e0520a57ae49ea264a282
SHA512c1f0292c1c1e16bbd341179e61d651154a6d97a6d6e12e77e5c1800886cbf33cbba14ad233f0b0a61aba9894def69795a6d7fcb6793fb762378022aa7a80c046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64dcb38db8e5867055d0af091b83326
SHA130476a57e2fc3752ade05806d4389e2c01e7e2b1
SHA256608c46b26cc894208fff97b7eea53be5aa9dae132e5b7c8d08e65c2291ea6ee9
SHA512836d30b78d17fdd63b2d5bd61810b1e9b3c0420958abc533753be759d9c1db6935728bffadadca7619d4144ab5c8d62787b3575484b8ca3d6498a8a0f4a1f552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53d196cea0a6230fa1ffff1d17dbda1
SHA1014e138abe85c7096bb1d329fc2169bd89048bac
SHA256b0fc98b0384b1dc44630d0835961ba32ade0b928961fba2a2bf441b8baad0856
SHA512819bb11f1390f85f3ab77163d693684bcfe8cd3177590a00478dbadcc58556417b1614435bb4a3d1da32cee1b207571d17492fefca173c682ada6996fd201c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4084356fd2a7fbadb1f1e098b4a60c
SHA1ccc1500e04ef51b6d25de40e122808cf3c31e74d
SHA256cacec0568e8962caa1ee94457d876fe9125eac9e3df93e32fcc49ca0f9564f42
SHA512d5b08275371bfaca0b1da3033ef8461c6b0bb0ef79b06fd8e73db900b943b832382338b1c2adfc22908f35e68154a00a78ff5e23e3631f3c6a4dd5144cdc7304
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a