Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
f523581c15f06847a41de0982a4d4d6b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f523581c15f06847a41de0982a4d4d6b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f523581c15f06847a41de0982a4d4d6b_JaffaCakes118.html
-
Size
156KB
-
MD5
f523581c15f06847a41de0982a4d4d6b
-
SHA1
7dc77c614758114883144958958c2f6eb1de9308
-
SHA256
ef728a9559878be818252df8c4b1621bfd904b28d06e2513bb0dc317d6ae4933
-
SHA512
51474497f6aa72881435a81f07382e6e387f0363623bb8949a5e34e9ac4f618bb022172a4d600cf10379bd30e0997eaeeb2511ed114bb903862cdd4e71184ef7
-
SSDEEP
1536:icRTZQY+E4XoUIfRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:ieaIfRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2300 svchost.exe 3016 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 IEXPLORE.EXE 2300 svchost.exe -
resource yara_rule behavioral1/files/0x003200000001749c-430.dat upx behavioral1/memory/2300-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2300-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3016-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3016-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3016-449-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxC217.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66B12661-BB0F-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440447899" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3016 DesktopLayer.exe 3016 DesktopLayer.exe 3016 DesktopLayer.exe 3016 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 1628 iexplore.exe 1628 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 1628 wrote to memory of 2364 1628 iexplore.exe 31 PID 2364 wrote to memory of 2300 2364 IEXPLORE.EXE 36 PID 2364 wrote to memory of 2300 2364 IEXPLORE.EXE 36 PID 2364 wrote to memory of 2300 2364 IEXPLORE.EXE 36 PID 2364 wrote to memory of 2300 2364 IEXPLORE.EXE 36 PID 2300 wrote to memory of 3016 2300 svchost.exe 37 PID 2300 wrote to memory of 3016 2300 svchost.exe 37 PID 2300 wrote to memory of 3016 2300 svchost.exe 37 PID 2300 wrote to memory of 3016 2300 svchost.exe 37 PID 3016 wrote to memory of 796 3016 DesktopLayer.exe 38 PID 3016 wrote to memory of 796 3016 DesktopLayer.exe 38 PID 3016 wrote to memory of 796 3016 DesktopLayer.exe 38 PID 3016 wrote to memory of 796 3016 DesktopLayer.exe 38 PID 1628 wrote to memory of 2072 1628 iexplore.exe 39 PID 1628 wrote to memory of 2072 1628 iexplore.exe 39 PID 1628 wrote to memory of 2072 1628 iexplore.exe 39 PID 1628 wrote to memory of 2072 1628 iexplore.exe 39
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f523581c15f06847a41de0982a4d4d6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:796
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:799758 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f6cf7390533bd9ab17be442064027f
SHA16dc846097f93f7f9806dbbb8872e11eb9e32d3c3
SHA256e7fd23259e2d39cab716437ebd69093d17b46094bf91b12552164f3320f3507c
SHA512316f7a67e4b4b0901739547a0a1b2c1dfbf1fe942a827f9f8c31da1eacbbbfcadc838b3b5ddb58f00ef887a602f6060d2104443158867b6f8ece8ad771081d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d24cc4ce45aa59435eac130efdb36f1
SHA11356231d3010038f4987b6bf37480d2d191660d2
SHA2564cd8539e18740120a7915a1d807aa634d0f3613753da1678016e2a8cd63080d6
SHA512402fe161702349b0e31f6e779a352535ea4128f82ecb61607efa860bc750bc975e9cb94d8530f54188989028392fb62153dad1ab057b30ae65d8abfecca7e0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac117fd88767bfc2dd943504ab903f71
SHA1e31e74134494d59c490861a61c5af16ed2387d97
SHA2567109ecdb54c51737c3d09e638d82cecb6c313d941314f652d348a74014e3b722
SHA512ff00cb5eb1b5d9cddcfa12239ac45521408bf002a7e709923b36d308cbc3878bd66cefce2a3384becf7752f39c02fb2a5948b5b7b8ff793cd23564733f79e26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54587876b6d7558949f811fa143a12341
SHA143d9c2a013af39ec2bfa81cf2a729d592d83c71f
SHA25600a6cd2645dc668ab48334b27595611e77236cc3ee7ad130de27cc4144883be0
SHA512b554e7ecbe0a9da417a81c980c13acc0ff28769d40480c00c6329ad7c12a76807294281b6a98da8e07b5c75d311af67a3aef71e6efb3430c48ddd2feedd41c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58682b49654cb4862136e31e103f5223e
SHA191a5e9d8e6e70358a745fd9ebe73e9972127369e
SHA2562d6d1624270c859205ca73467593ef69e1b2c8f382b0c4140b8a11e6cf2e3ed1
SHA51260386c14ba4fc1fb8f7086127f8b602d589339038c4805d873d823929e8b171c27e1a4d080feb03bd39675170225fb92ebda93c409c6bfbd811ca9bb08bab00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b34eef3895309ba24ac53901e62544
SHA1599dd86ca5fb5944c321974e80d75e45ba2f5915
SHA256b66a293d25586ee09c98ffcc1c89ebee1da1c03c89d82a3b49c33acfde897044
SHA5123010b50ebead9e96e7d38309a75eb18e7f1ce3878e19cc9451a8426cc27196174509e0daa3b5065af2b4d5da5ee973dc05fb881bded70b64ecae33f66d6c9378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d1fb6cc816912504e2ded251af9f23
SHA1ffded3d433a176ae192cbdff0202562ce0ec9c8a
SHA256525c2e7bd232dd05564a72db30d520926bac70f924acbc4167280f0cf8267728
SHA5123acd3e8796c16c7c880d2af2e16fd417d5b4b90945b1f796eadad884b6ee833a34084612b1129a53b32970ebcc903eeaff7a814506f480cb6b687e8172afa25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0765ded445e3143d906fd4fbdcf6f4
SHA1f44881c7850e9021899a9b8d82dd05942a8bcd7f
SHA2565a124e1861b74546f1394181cdd513a13a7229718fe5bead2dbb4509c45ad235
SHA51278da895ac2a07cde82652f547f3dc2c4273bbab688d098cf07f5e9499c6f2724eb035af32f94f2d034ebeae8b937231f2edd145ba69ad9f1f13686d165001f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783fe0b502546623cc83ebe36002fabe
SHA1ccfd802a978d2ec065e5587cdfc7124827005eb8
SHA256e0081b6a941e8cd077051f9490fbeaf5ccdd052a39df9796d37c4ad603dba16b
SHA512396327aaf3ea17c4c0ddd0bd8c6daa71379ec70b3e3ac4b286f3c4b5970085b3d18d53f084054fc1a96a60c7817fc4fe3f2ee836c475140fe4afc771b0f5aa72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79d985edc5f4b99c999ff90c3ea1597
SHA13569065b7817cddbe68e47a8ad682264eab97716
SHA2568c45997bfa679f7e59d104d676c991eb9b1c24742e807f5e064a9714882cd120
SHA51222acc445a9b37fe04e0d8f3da4cd55cc88a5483802d99f89473b41930447ae2dbb05c5b0456e4e50d0f8fa3e8cce52381a447ceceb5b5283eae0d1ab27583469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ab074a632df5c94b3492ca698a8769
SHA1d3458527e8ef764ad0715d8e2c0c8ff1fffc5403
SHA2566a8faea71f24a7ab3a37c26e5706adbeb790b15ff9a85c6e172dd76645ce13a3
SHA512a517798f76c627e160b25f0af01e7f92ba9dbce3a7cbaabd0c86d11002261340c92921e70ba050552ced31d12e54b724ab6da343cd93ba023a685e01a2d172b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9790e7f1aef3f50c1ba0c7c33520376
SHA18ce6c4274fee621c29ad533f6ff40db2f808f755
SHA2563ee384b3eb7dc5be5f72a8ee721b4210123158df845b8d242234f198cee7ba7d
SHA512b78cf3ae6ca9f93a3270eef41c5c81ff4e0b841c2828be37fb4ee01b2105eb1c33322c93bccec57bc1ed2763bf8782523e042b6283cc7a483ea03042a88184e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc05481010fa301d8f7021b9158966e
SHA19e64c5fd8e8247af3531258bb79db943f5173bb7
SHA25675d3ca52ef46833b5735a893774817d2ea28d6a04373f7ed2866be4ea8763055
SHA512affadb9ef5fa1a5bb35872ed457ac3a2263e78fbaba1381d3a1dcbbe56915b4285c88e1eee73d67d9ccc5a46eadbeecd34cdd7205d6cfadb3b8b63cd1fd3d7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b88feb6ef47f3a1c7e307e6cf86485d
SHA12a38b0d92932aa35b9e09ffbe47c8fd9e2ed0c84
SHA256fd4920a7b3e8b66ca01fb963ced81fad87452d34c8bbc1873bf49ff2f6dc33e9
SHA51244abaa9c37d687a8999ed1c6427d1c0958e498b64235d8df50c7008805ed632fdebd9eda5e22345066b3cf0cba548463399dbe0c826f816605b42a0dbe9aa7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3e183f90846bfaa0a8cdb00bd4e9c8
SHA142cc1fb1455b114577c3206dee20b805a20b6aa7
SHA256493e3502fa0ba93dc67ed77253835189e654c97fb42d80be533d057c950db4a9
SHA512a5f44cd01a53a4cd64aa879766fd6b08878afeec7819288d8726d9d91249cb9696371b457583689ee878d85585e63ca60f834f4d20a3a213f9323e62e0f50df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f473e3f3205cfc14c3c1e0e7105a2f63
SHA146314a17c2ec971cea76b3dd177d3cb9bc8b619a
SHA256a01e2c789c0c3b2ac6c1bfbfb320dba0ba8bda6d4bce17dd2d66a84a740f4825
SHA512b1b18f492fd07197c3dcd47ece3e4b9df9749a49f47346c86053308b85ecaddecefbbeb985a0894879a841a03950f054b5637207432dafa299a9158bbadbaf62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46d6f654597974837b02c8a605cb7d7
SHA1a3b5a3f93effac45a77d063ec7aa139dbb726e7e
SHA25636bff9c0df0b3191997ba6b2404b29a46991687c4b7afac39141b6fb8f32e056
SHA5129ec3982e1bfca4205d4823ce021ffc538a18fdce46749e190075be148efb102dba3274dada95beb67164390610492b0e75b27835d4418aa7915d7d3180da3124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550dbce20ec559f50f17b0bb8d3c1ad9b
SHA1215a053e33595b0bb5ab8d40d88d70cf2bd7013f
SHA256e39d942a7dd2cb2852899c7c31feb7fd544587722963d60c7493d7f6afda3a91
SHA5122494c392edc694d087b741282a9d92dab0d73be3fed7b07344848fd001b70721977ba76a8d5f5e715a6c45b07a0789f279f4ee503b82015918cc3245e202e121
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a