Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
e2dbee25b239267922dc4865eccbd7ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2dbee25b239267922dc4865eccbd7ba_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e2dbee25b239267922dc4865eccbd7ba_JaffaCakes118.html
-
Size
157KB
-
MD5
e2dbee25b239267922dc4865eccbd7ba
-
SHA1
240450ad7ec67290cecb07b8e165ccc2a153dfc6
-
SHA256
6e3beb9d26b206745e691e842e38fc356ee8407c21e7e4982bc68e21b88fa6e6
-
SHA512
26d0030d4b3765b8afa704e282e7eb8875e8924ea6c46f111090c3c58fccb201e96c8ff663202c4195a5ab5970822c334d85a2af7bb05b4891758522e2984db6
-
SSDEEP
1536:ijRTL9ozV0nu0K8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iN4f8yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2500 svchost.exe 560 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 IEXPLORE.EXE 2500 svchost.exe -
resource yara_rule behavioral1/files/0x0013000000019274-437.dat upx behavioral1/memory/2500-435-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/560-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/560-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/560-445-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxDCF7.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440164149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFB64891-B87A-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 560 DesktopLayer.exe 560 DesktopLayer.exe 560 DesktopLayer.exe 560 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 1580 iexplore.exe 1580 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2904 1580 iexplore.exe 30 PID 1580 wrote to memory of 2904 1580 iexplore.exe 30 PID 1580 wrote to memory of 2904 1580 iexplore.exe 30 PID 1580 wrote to memory of 2904 1580 iexplore.exe 30 PID 2904 wrote to memory of 2500 2904 IEXPLORE.EXE 35 PID 2904 wrote to memory of 2500 2904 IEXPLORE.EXE 35 PID 2904 wrote to memory of 2500 2904 IEXPLORE.EXE 35 PID 2904 wrote to memory of 2500 2904 IEXPLORE.EXE 35 PID 2500 wrote to memory of 560 2500 svchost.exe 36 PID 2500 wrote to memory of 560 2500 svchost.exe 36 PID 2500 wrote to memory of 560 2500 svchost.exe 36 PID 2500 wrote to memory of 560 2500 svchost.exe 36 PID 560 wrote to memory of 2540 560 DesktopLayer.exe 37 PID 560 wrote to memory of 2540 560 DesktopLayer.exe 37 PID 560 wrote to memory of 2540 560 DesktopLayer.exe 37 PID 560 wrote to memory of 2540 560 DesktopLayer.exe 37 PID 1580 wrote to memory of 1424 1580 iexplore.exe 38 PID 1580 wrote to memory of 1424 1580 iexplore.exe 38 PID 1580 wrote to memory of 1424 1580 iexplore.exe 38 PID 1580 wrote to memory of 1424 1580 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2dbee25b239267922dc4865eccbd7ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2540
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:603146 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd18d185609aaaad74d230870dc2d2ba
SHA1f2b5579943a0ef310ef5c03b4c847eaa7259b699
SHA2560fcaf93b1ab9c4803b0fd0c4089f195795f4c679f05a82198d085590af9d43dd
SHA512c71d58534940b8973540f4d1983593269dfdbe7755db3237245e88b74a7116659bea65ccf7e284bc57d92bbcd30cb659acd2edb6abd409a987189b97faa731e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563080601f36126e600a905d1806a83d1
SHA163a97e613131c4c22a27881a2efecc6f66b5b84c
SHA256e5a5489005557391ec09df25830872ada66a1e9a9d9b563d28d6a1419647760e
SHA51247088f241c5219a427d628e46ed42b7efe95a0ddb19548eba00f5aa9f00c85995e56e3beec255dcd3b6d8f1e227fee39ccb8de3499df5858ff7a9ec1f2f1e1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53797e5da0e4552ff24e5d56e6d596236
SHA11b6a131402a5bd11588f6e91ea967a556c0a68a3
SHA256879a0384bbc79552957667187222f06e1a9d8285dd16724e0e776c34746cf197
SHA512be1e06270b2825f500dc910c8f55f3c4a08e80883121309a53d62c38360d59106ebdf3493496043b4ff219e6ed1cf3b770e540cb7cd6da4e32a0adc6fa5f8bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813c85d052bf7ca4bfaa34533d904211
SHA19a956c925338af98feea884b299880fe184947d9
SHA256c1606b788af522daed5de3a35aa139d75ab792e282387eef25a86e0797c3124a
SHA5120ba496efa14108f901b86ec1d71bf20b30136cb2154e7cfbc334df22a0ca06ade3c7d5ca67eb7a1e0c943630d2050dd235f4f68a1c058f58833ef7b4cfa079ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2dd70d0a831480d2679293846d80286
SHA13bf4019f69acc9db9dc54cf7a4965ff867306d6e
SHA2560ab7e9eb7e78a8688cf952299dec4a7d47457498c8f73d2083acd8ef9e7429bb
SHA512cd6d2f4042393490d11ed1cbbbf3a06fbdae99353f22d73520c4f9c3410702b3c82f61aab78ba18b1155f88af4f21007585b7fb98609f7e944bdff64d672bad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536aad55529c99a347ad329fc3913a928
SHA1f17f3f444b1f6f6631d6f8dcb0a065db63d422ba
SHA2566ce958596a62c1a9137c5f7d8ddcb8cb6b6d62c2777f7dc79536990812f1e004
SHA512bf990e079ba0ba62c326bb9739fbdea618e6d7119ad543a80ac29b7a8066fef82fad57d5f9fe33cda1ed532e8403ef0fd1099f026a398c4253b988cb165f1810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d317b8c0d9b1196792cfdf5276ba6c
SHA17a0fa461aa32762f3faffcdee5b4645bbf4fd292
SHA25632af5f3e92e4216fe088478cf11c6dc145516a8b7008ba20d6fb01fee9cc959b
SHA512b0b6d778d4fbebeb4d861e38606156d1c42ec42f4559c2a3e91f47518b70d830b72ac56d9e0613698d121e2ad0289f895547b229607ec058aaa3dbc10e0af44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7923e3b0a9142f407603efd19ce297
SHA1c2e11dbc858c36e814c983d8838bd834dd06a9d2
SHA256753aa5fad4928080fcf00592c70bc89467638306350b0785cf8222e4dfeade6f
SHA51287418e9edfa16d36b9ec277d62c1303a623f446522911762fa874238b866ff0a185685253d7efc15d8b983c3712cdb5026d30eb21a3c0f75c504751193006ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985c3d83500052ee841a095030df96ad
SHA12600213e0d6c22a0b1bae59c74cce157b6a51fa3
SHA256dd56015e9840cf7905695b192f55d3202ad52fe0a1de0d5c6f7b054cc1764b97
SHA51212fa2f7bf9958f22bdc5fe24d2e52277fc056dbd953b15e5bdb663039faad601b762ad7ab3cc5ef37ee7b4b1ef3348a1619dbc9ac21154ba50532e33b6d6a243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b63192d65069aeb8e835d97dc4df16
SHA17b45ce53b885ddf61cf54ef662bbf1ea109e6eff
SHA256329755ed7895a4252f1ffb083de3e9ecc589302c1645d2964517398cc6736555
SHA51244d48c10ffda8f3d7c7cd648b43178ccbc183904d94d59a051310cb37bbf0e9961053438e71ad2f5370f6ac5b3c56d27c826da30fb8ed98bc91ff79b95fe986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57094ee8d9d61aff258273069be1fb7a0
SHA16b71cb0f48984e3bae974c3e0423c682cad9f7f5
SHA256d1d66dbbabbff626bab43783010f4c9392ec6b2012c827b1b48e089fdcb83fdc
SHA512f623b0444f8540e72595fc8fb1cfd7a2c228ce8e63e7cdd116f363a9a5431dfc64b5d01580bfe3ed0052f606c9523518a21289bd3f11a05bca8ea2a663ccce72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd4216c67fd787743812d7dba0cd442
SHA16702d89acd0dc9047aadbb3c54acc9a64d1f7aa9
SHA25683508272c564348476085cd1c0513f93eaa75a5929b6f255e755cd3fec19c4ee
SHA5123de0b5997315ce6568ad678856b4be32af44f81dafb26c4717555875f169b5631a8f0d30c1f42807692aa9417b06b95164d5c3ef91805b141460dface9d1f7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b934cd338f915d2200056c6b0b6d6dc
SHA1de8d9bb0a1fc177d37d805b4c4b0f47d1e3f361e
SHA2567ed1ce927a2dd690771c4752754dbe38bab99e58271fd45e8753c47553f3da95
SHA51212e1527c33c5c98ca12fb1b031ec58ecdd2c9e2b196a4f65cd6616be760d8b0ced642888e51407b11c64b45ca5a90e1974c4e463fe475217f59a9522342bb4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a98d5b33071454c8afc301ae6350a2f
SHA1249cc0cc0e87c58c5c8a3d243f021487fcb967fa
SHA256f7498bbb20c75fb96d599b2c186224bbcede937092ca80a8ae0caeba0b25b680
SHA512769dc43063c2cc19195821a4be7cacbfeeae99640ef3462a5345ff41b7fa091927a4dab4cd883f2bba9e6be19eae304aadd2ed5f736252158524fee922ccf8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f237ba040650372f23ada9480109d41
SHA1b6cc14139b23d695b13c9fc64d585d7a7eb29444
SHA256b7766da3678b239357b722c783e40c1bddc63b0f8cd7286df4d167405cb98036
SHA51253e117e1b19d58c4ecd07f73030d048aa78d60b472a282f1bc1a77141f6c828c6f49100bb93cc24fb0c2a3e93fd04906dca9ebb42dd5bcd58575b107462cdc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa6157103f2fe6087d419661d221e3b
SHA122fa750d7518090c5e4ba65ce9306cb7d081e7fd
SHA256dfc6b7f380d32f3a1ce69afcd86dced4c3cb40ec860e37a3cef79d8dcf0901eb
SHA51247a24eb488e621356a932575486948a617a41d9e9ab1c5c7d326873301be8701d014a7d8fd80c2a82207f10400b0e44f3a09101990846ff310387e3f2eab85ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e2b3b3afe969d44dffd408ef76865c
SHA1a79f7d3b48ac5d0486d7aa2f1409554a6c4d72f3
SHA256680b645c77153fe8ee0f6b8c7aae08977e58e54126402763f792a96ffa936350
SHA5122cf18b74e7af311c113686b8d9bd999bd8b3d3ff4b2e4ea3734f5ea686bfef6ccc5753df8bbfa75c198f0486ac2b23ab7fba7b41dec0249de32f4faecfd305a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b