Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
e14a774d2284a22107638acbfaa0ed15_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e14a774d2284a22107638acbfaa0ed15_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e14a774d2284a22107638acbfaa0ed15_JaffaCakes118.html
-
Size
160KB
-
MD5
e14a774d2284a22107638acbfaa0ed15
-
SHA1
977f44c7b3c3b6c0e1bb757f9c966438b14b21b7
-
SHA256
21623afc693d3ec862c5b52e4318b5837c9cfa503fce70f341478ed62073e89f
-
SHA512
99fe7edfa4ace2e4b352424deafd521c2dd5a7c0c53a16d999aa3f88c84d88b03b5e9d981c027a5e9b40be26237487b7f4a46d6dbbbc04277e2ea0ad9eabaf3a
-
SSDEEP
1536:i2RT7F7HuGcMA/hkrMwyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:ic43MuvwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1964 svchost.exe 1752 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 IEXPLORE.EXE 1964 svchost.exe -
resource yara_rule behavioral1/files/0x002900000001946b-430.dat upx behavioral1/memory/1752-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1752-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1964-436-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px7DA8.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440078839" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EF892D1-B7B4-11EF-A5B7-F2BD923EC178} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1752 DesktopLayer.exe 1752 DesktopLayer.exe 1752 DesktopLayer.exe 1752 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 2676 iexplore.exe 2676 iexplore.exe 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1228 2676 iexplore.exe 30 PID 2676 wrote to memory of 1228 2676 iexplore.exe 30 PID 2676 wrote to memory of 1228 2676 iexplore.exe 30 PID 2676 wrote to memory of 1228 2676 iexplore.exe 30 PID 1228 wrote to memory of 1964 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 1964 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 1964 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 1964 1228 IEXPLORE.EXE 35 PID 1964 wrote to memory of 1752 1964 svchost.exe 36 PID 1964 wrote to memory of 1752 1964 svchost.exe 36 PID 1964 wrote to memory of 1752 1964 svchost.exe 36 PID 1964 wrote to memory of 1752 1964 svchost.exe 36 PID 1752 wrote to memory of 1600 1752 DesktopLayer.exe 37 PID 1752 wrote to memory of 1600 1752 DesktopLayer.exe 37 PID 1752 wrote to memory of 1600 1752 DesktopLayer.exe 37 PID 1752 wrote to memory of 1600 1752 DesktopLayer.exe 37 PID 2676 wrote to memory of 1120 2676 iexplore.exe 38 PID 2676 wrote to memory of 1120 2676 iexplore.exe 38 PID 2676 wrote to memory of 1120 2676 iexplore.exe 38 PID 2676 wrote to memory of 1120 2676 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e14a774d2284a22107638acbfaa0ed15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1600
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:472074 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a39a3329b2cbf9d589f679fe21d19b4
SHA17d016ae278e1c15ca37363ebafcd109d856656f7
SHA256dd8a8edd95e01afa830bf87bb3007cabfc79307c76b993611e27037a196caf0e
SHA512d8affa8117f6029fd03273421e4def3dd5f90537a29049d86bdc6a3f0a9f718d92822db9bc730502e798cf3c67e82b6a2a81ec4e8835f764cc4fe058eccc1f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480767a9e707982f3d31db125b8e85c
SHA1a9a970c74d2e0342c7348b67b1c4af58cb3552a9
SHA2564dfc55e8b6dad9f0de83a8dfd7686a53be69f1cbb1fc821efe74982395f5fa7e
SHA5125fdbab3c0b1e8ffc856c7ebb314090a1abd481e6438357ec6c39081885dd6827e0809eb9d2a5f748e0386ac4a96250fb68e451a3db20ecc62a0573ef517d1939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a671e6984eb640f67f5dfedc679764
SHA1b012af2476dc5f583686d27681728de698c64d32
SHA256869430ad297f47694b2e2a106e85e5e651fd6c47fea437e193984f0b127aad65
SHA51266026614b4de179279b7162c0b34f83a13c2151c279de24b5b67dfd926188238858c5d4ed60ccb86cf5565d12b5fb9c22bf976fb0734c3fb264c359d2d15c75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f43a57ed087e1b74589483b56421ad6
SHA18b243a01dd9c47b8742e0a33de5ec46deb6a0359
SHA256c661ac6568d27d99faa8540263c9999e8186930be240e46f9f9ca003ec66eeaa
SHA5127ed9ba54ae0bbc0a68412d021e0f683a7dcfa6baf8c519c95ad05a66ed13c18e54a17966b7329f7debc5f027f3476a78ab00169c5fcf2adf2e34963b93c8332f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4e6b61eb72e99b1bfd3b1a3ae50b65
SHA104ce7a057c2d5b2c386eaf2f61a6ed43d6940b24
SHA256c1516acbaebc822790fc341fa44952dc29998554942eb76ec14bcd6c9f24428e
SHA5126e33362ace8359d736e7d1718b51c6060bf3bb25281f890494ff147e11b72a4b754b897631e18ff7a6c8e926e7bfbbb3c7a555a8f1dfa5effb79bc2d3129b2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b24658b257a914f85569ab404d738cd
SHA162e91af5d5b39280109b9cc4246ceaefebdb3e25
SHA256a9007d09d8dd293a1dc3dbafb00ad9f8b6a7b5c64d5b5802c4cdfc08a44814f1
SHA512b5597236e8c4c85c8390dcb244534652948ac875b89535db98f499528dd5591b003cf004cd5a0fc8f6a6c9d837c8b13014250d518463abe2b36c80a315f8d8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e159853858d7000ab29b4d2726a9e2e
SHA10599209529b09e0e89bbea8c5f88488899bc63ef
SHA2569da669ea38406cc86f437a98b427bdf7651a31beae5783dff9ebcf898cee34d9
SHA51244bbe8cf40d08c192a697f9339ca6fb770fb5121736b75fa09ac3a028dd3360eccea7306882122567aa0a78c20e6b8b74feef02185aaf1e7b705fe74e7c0368f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d553ebcdac80f1e9b1cec5662aa70978
SHA19bfa862a3f5b3abd608d3146ce1c3902c951d5ba
SHA256111ff5941dad5c7d00a7c477dd3814a3f60e15e3f3ea176f1b96af98cff1692b
SHA512204a2a9d7b19ddbc005100ad83760be133a1f0209a2b748d4b54bfaab86b5bcb3c0f13745d531af7ebf6082767dfdb44a933e6e49a36a61cf1422709780c2dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f47fa69a7dfd7d32dd470586045f68
SHA18abf41d338e97fbe01a9431771ff4c0ecd259575
SHA256520c510646da38791ad8517f89159cbfa1c13f4db46e23329ecd2a039ebfa2c2
SHA5125988742e3f4ad24418851145e56999393dde22624b02306f18b61b4dae9af0ecc932aaabaa6415a7b4cf109a443bba9836f17175137340ad81cfa386d5a0fa2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17848fac189451d73d1f1a8defc5eac
SHA1ee25d476f52723613571b39a308e9ed591b0121a
SHA256f2b7a83c444f45e65f0d82689fe96250744d6a1ae2dbbd9003eaa23a43acde13
SHA5127b4f06ef48dfad10a8dad31cbd3a2edb470a8efdaf84aee7e4e27ecc0be7c69e21bcd32d93266f244ebe7ecb923bc07dd7a79b58f06516c9389cb5014d3f964a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f73aa9cdd9f0e9fe90c69d8aeb9a1f9e
SHA16e5dfd3e1786834f66dfc80a5750cb782e4c90ad
SHA2562697f45758229fc96914702efefd1b303638315201bbc97ac58e0350d7a79b64
SHA512f811f7848be379d091afe77a8b2c77ca1ae2b860ceb23a6a84a03cd22d466a68a84c4765a065ee0f6e78cf855d5818e5ee930aaeb22993aa8aadcdaefce8e5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe94ee32a34e7dd391f9d827015239
SHA1e3f4e6c6ccb83645ddc52599e03dc96e0bb90793
SHA2561fd9f14d5d73c9b20dea062410c4c2347199c7dbb809173471c9b1486bff1262
SHA5121e2b99a79d61077869164be242a9ad6a9c29c5e9c8ebbde6c411e8dfc7266f1567993feedbb73ce961bd9ff4a1aa97e334fbb34123e37b18d480745c6f3cbae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b40d5195258f5c194fafaafa5f071a
SHA1b31862f992746bf98f77769b492ac85a1677918b
SHA256c156ffc508b20b6c2c3e76489ad8f5ac31e011e721f0d29e04cdea0953bad9a1
SHA51205da2a0e2ec0b79431d9d71cecef6ee8fa365af1782d8452c205d018232612f8e28916e5361c956018b8e3b8751e85d23a991bd96e44d377e79931140236e414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd3c9e5d263f8a18a052ea7ea70e54a
SHA15015d582c8538e9968ca95cae0bf46b3202a6eea
SHA2562758110145bf7ba179e0795b23ee795d7dafbc244fe47465ad79548e80769288
SHA512141f14fd7ad1fd2cf820aa4f93c49abcffd734c60c81363f60c60d975e94c18e81d8d0be22d0b8e493c9b64fd83cf47bd987c870d99784b4627b6bdd0d4a61ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e5f5de7aec1b43cd8f67fb39465f92
SHA1bf340e52fc1fd2fa6e451e688679d48d35d0a2cc
SHA256084d336a87f58841f57f4a7cf00108e01d8ece75f3de4c8a008f3beca58c7f04
SHA5122b1aa28095e377c359d96fb5bc0069314e056fa5771387aad7d7e22ba1d2cfb7b789a9d2a62883fabb942af91bf383e45638406b76bc68359eb1d8903fe029dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c1a376388bdf7c18d0a38d2d68ae77
SHA1abe82984e7083cdaa3afb62766420e34978e2ce7
SHA2567ce6a5fcd04b5c7749edc6c308f2add731756ef5509e35c97ab2eb0e4062408a
SHA51234c08d6a8ee39f9eb68584a0e1fae80c58fba7771f61a4efb228980c648c3be2acbceed38b4d8c05424cec1adc620efdb94d229c27bd235b2a85b02a4a37bdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e343910ac89b2aff3824438b0ce9b1b6
SHA18fc2a3a8ee0a5337cdb84301741245de5aa1d75f
SHA256ed96c5e5545dd1449ff74f508376ebcc15e8edd3307ef685c99a5f3c65770e5f
SHA51261bb6f87e7bcc169858332924358cdc51509f116fd49f0034caa9c0446e3e63ed86febfb5da06d803150b75a77b05080c355a05787c01dddacd7d54d09895f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa590579c61ad355de02c02a01e5fd27
SHA1af3a48d89eb512da5262f67d13194cb5d7abfb2d
SHA256e240157156129ca0159e59fd10966e658771ee0728b8ee9ad8ae1e9633aefa4b
SHA512f57e14be2558b6141bf9c487d030daadfd76147aeffc6ca1161d3f3a2589b5533794cebabd006f59d44b79d782f99a1bb52be5ff4d9bc663cdc0cb38f1b6cfef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a