Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
de603ee113642fb718ea1c7d240b6f07_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de603ee113642fb718ea1c7d240b6f07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
de603ee113642fb718ea1c7d240b6f07_JaffaCakes118.html
-
Size
156KB
-
MD5
de603ee113642fb718ea1c7d240b6f07
-
SHA1
51359f4687f91c50b9a73e680cf48061b86492d9
-
SHA256
7a4db85b3a7ace649cf78702b42d3e73977faf8f5322afc7e8319ed02b58d816
-
SHA512
b0573a2230da06b4e11d7b026c091bdd90746ec48ae5eba174abecc1ed9c829e5cd0d298d048fb5e1a7ebf48f6f9d528f07f48cc1bcf77727034bcf24084b447
-
SSDEEP
1536:i+RTmvIuyxnJ98ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:i0rJoByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2464 svchost.exe 3000 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 IEXPLORE.EXE 2464 svchost.exe -
resource yara_rule behavioral1/files/0x002e0000000193d1-430.dat upx behavioral1/memory/2464-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2464-435-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3000-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3000-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3000-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3000-452-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3000-450-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px99B0.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8419B31-B731-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440022859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3000 DesktopLayer.exe 3000 DesktopLayer.exe 3000 DesktopLayer.exe 3000 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2112 iexplore.exe 2112 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2168 wrote to memory of 2464 2168 IEXPLORE.EXE 35 PID 2168 wrote to memory of 2464 2168 IEXPLORE.EXE 35 PID 2168 wrote to memory of 2464 2168 IEXPLORE.EXE 35 PID 2168 wrote to memory of 2464 2168 IEXPLORE.EXE 35 PID 2464 wrote to memory of 3000 2464 svchost.exe 36 PID 2464 wrote to memory of 3000 2464 svchost.exe 36 PID 2464 wrote to memory of 3000 2464 svchost.exe 36 PID 2464 wrote to memory of 3000 2464 svchost.exe 36 PID 3000 wrote to memory of 1420 3000 DesktopLayer.exe 37 PID 3000 wrote to memory of 1420 3000 DesktopLayer.exe 37 PID 3000 wrote to memory of 1420 3000 DesktopLayer.exe 37 PID 3000 wrote to memory of 1420 3000 DesktopLayer.exe 37 PID 2112 wrote to memory of 1928 2112 iexplore.exe 38 PID 2112 wrote to memory of 1928 2112 iexplore.exe 38 PID 2112 wrote to memory of 1928 2112 iexplore.exe 38 PID 2112 wrote to memory of 1928 2112 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de603ee113642fb718ea1c7d240b6f07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1420
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:537614 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52120a1ed4544f0aff48f3a628fabb85b
SHA14733c3ad077e62c56395145e04b166562694675e
SHA256c876a24eb224b4cdd3a5593c672b375d5110bd9570e5bddebf882d016dc42927
SHA512210d151059482c56678b2728edda802c10315a5cee06321ca4d92a4d9f6f2a8b567067ef24852b34e15e1f2a525d577809a890d7565587b90169efad63425bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8e13e4ab98f612ac292c991425fe30
SHA1faff0c49c4aafa4a318b05d8a8f9651bd42de6ff
SHA256379425bafb7c5109bcf9bedf51851f855542f28ade65b0735f21fa901d0be786
SHA5124cbc92a0f04ce967416ae7c0c49633d15faefeb53c9e70c70dd8025a9ad39ad7793975beaf75754adc855eb1b5829be92531fc48df1db6b84c98eba4c0a8c5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012a7b900117bffe7937143c1ece1f58
SHA18a2a5fcb4610e6ad69770c64510b83546f97af5c
SHA256fb4c1f39879c33788bbbad96472e105db06c426345ebb12fa6e3b42f842930df
SHA51275cd9d95a83bbbf2c107e0e97a2dfb6696168ba74b9f9b443db50be17787a864bfe40eb3aab4ca1efda727f18b51032a0e58e2dca0d04ca27525f5d27d355693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576483c1327026ca654425162f9d15172
SHA15a0f307dbcc79f8dc0814eaef15ed1ed41405bb9
SHA2564b2f70f22e96269f637b4207fd27f21ee418071bb445637dd7be40fae3cde7db
SHA512d0b2ba2245bb339474ef74148fccb2a9a8aab14a0ada11cd93412eed7803513fa06f3e737f37f8d13eb3f3ac26e776ecf29f85a03f4afa75efa1bdf34aa0e6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543499926ddd994b47e4b9a34b60ba18a
SHA124d35d74f7230998913e77cfb2cb62ba56e6f14a
SHA25699db9ab24d215fe045285df7f6cf1107947356c8eaf7d439db0b7dedba43f969
SHA512a1ff3d27e9e7d003cb69d748024cc922ca0438f93fa9f27bf40ae3a06305ae7e77a2a921bcfb38596e5b9a4d680c0e8c20a6683962e9c8a14860dcf83ddcdb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ea5823fce098d2e470668b76ca72a2
SHA13202ce79cd8ce7336b5da4b306561583798b9bf1
SHA256bba15aec9dd4db2c91a587d769c54e9cc6c08bd7f91064dd95ffee58294ad8f6
SHA51247f907c91a10527110aa8ebe3d5d19d2a323adbb56ab68e09043d3ba80468074823266e55c56aae2e200f11abfd497d95db2aa318a937f92800ce4814fee9464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee5c8a246fd8aa712b409ad159fdaad
SHA1eade43ed576aacfb3ccb18bb2a51261b1390a143
SHA2565943232670e1482b98ed998cac32c72ac9cf223da3232c89250649d78ecf1fff
SHA5127ff919c8f94508e14f49fba478b1093a189fbbe61c89ff05dce64b29e69abdaddea7b85b781b6558b38cfa37e7846f7f6fa38a9b324b113e3bd27c3917f43267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e50e85d8aaad8df86ff70824b23854
SHA15ba323ad90ee2a382ccf1f361c024e901b05671a
SHA25637b0fbb466702c5f2134dc39f32d973fb573116c2136430b7bc8fc75c9febc10
SHA512a97be54ad20b03f16d7f196606ad9e78479a953906df39260d4349d4fb13ad20a1b4f48083f0aa047a2622aacca061bd447db8bed877a8cd82ee5c673f058b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690d36490e77f4b8c7c424b828313616
SHA187d1841d528fc8f6ce46e72f9f51563d6d41ba39
SHA2566b593b4339380bdeba7351413e7166fa3e55c7a933e1aee47e881b8b7c831314
SHA512d217131eb07c6aee60bac6c778037f99e0cbce969d507d23628ad9ac315e961844e05a698613029f6c5ec81c3dedbf8d6dcc58d17aeb13cc3a33d7f99ee56259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51562c763a259ccc4a324f52b44160047
SHA1f0b07bac09bc64e6811f476242fde16c384ecffa
SHA2565e6b419c447bf281ea745a23b72b202430f9a7949d15f35dab6ecf1566c72b06
SHA512f2f2bb4401edd3d5847d832e3109d36dda5096ccf72a85a6b2f170c6a4d55febe5a0325078440e7c79f44a9d7c0987bcd322cae2fa8ba891745e8970a3ff1f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5388fa9d431f2a5b5c5023b90f2159
SHA18ee8d21e9e5f59dfc921d1326b5370319d943683
SHA256fa42aeac1384d96c62408131c26fa45c2824ed3240638847b01dfa889fdc6fc7
SHA512b7445f9ec647af852019f6b5bc669970c297679dd6358f1e7c3af256a8a23ebef2abebf4225d06da1ad982e2b7add641e5d2447ca4646f93265286bc027d7aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50189945cb661eb9768d5c43e10ad3494
SHA167949d9ab7da23fa6f61deae4b9e50027bd2adb4
SHA256c5f8e99a3fde11d84f387a7839df6933898a5e77206a0798b659c47e9c0e3c57
SHA5120e102db0081d7ecb17a41bd79bf297a2c90d58d0d56d481efac566c9024c91a2359fda8504393fe876c9cef68b2e5ad159325ff79956062f9149506c94fe8125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59174481b25c6cc1c5dfa164dafc661c1
SHA1f2924d7099f4f8241acddb0f3dec59090852b349
SHA2565c821021bdd031015b1011475102c357e0693e28a095f3e9993dff96a6a9de2c
SHA51219a04ef047a0a6a51105fc92b89106d69debb7f8a7a683dc75792f07063fdac1b35ecc9bcbc023f578ef05ed082a548a585588b8df414e1a043ca63883384ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6736cead0fccef510727e6e1917d31
SHA1969f04777937aed5d44269b231e0777315fa1f8f
SHA2566becaa4ffb191a2e70eac62e00e76536c56d34bd2aed1c4a822b5480597517bc
SHA512d6cef0f55b2870f054d6fce13f880da103d1d61e7ef4c7873815cd5128b57f4f35904a004c0aab38a398b4ec25299a6f18f53aba3b60f17938ca55dadc40af19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e568741850311bc6cc9ee0fec0342b43
SHA1856dda65d69bee8c0821872b56f15e3e7c64d355
SHA256ad1f566790c12d6b0997fdd37ddd04809e5c2fc738852af1a8531a131b5f3507
SHA512c99f55e1433738096a71f6370f4f611217baa12677ed7af60c32fb252ea091d46c82548fef314ce390066f04abd8d6f2c9a17cf7fb81db9760f2426cd31955fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf3dfe4d60cbb57154d41a8110af231
SHA199797c14db06f824e4f8480023a0196dc64c7829
SHA2567275c3dcce61873ec7f32fee1293a912d112c1ac380428d7f6a9cab1c26f004c
SHA5128afdf64609c70dc7f628bd0c3569ba96f749ec70dec8bf870197ad4d31b57e02202ca151306dce28a0b807e078b918e17f52834d7c9125101156611aef5a2954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba0fa2c94d45027588ba1801637c4a7
SHA127398edbd14383f0ba97eeaf39e4ee2de01ade55
SHA2568c2cd5894fec11864d6aa8d0c2caf1c95730d3e74b1064089ec26d6e4964ed4c
SHA512be42e8b6cb797071f4284566df47d63e3e3c3fe38038531e1367b32c46ae378fb69360d9057446751bd75999cb8864d9fb682cdddcb7ed2e388333e6344e0317
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a