Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
f659c846513131f55f464483fe4d507b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f659c846513131f55f464483fe4d507b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f659c846513131f55f464483fe4d507b_JaffaCakes118.html
-
Size
155KB
-
MD5
f659c846513131f55f464483fe4d507b
-
SHA1
1a7b45ddf9495b55e8296c7d450ee7d7053cbc54
-
SHA256
6f66c8db956b7e2f2f196569522ad2f76e1a89ec64df2be5c5cd06bd68e081f3
-
SHA512
4fcacd225ecd8a971d825295ca0274947e2f6ad776fe082da6e211aed0bfa611e0a8653451028b2f1f62e639f3e6b3cfe86ea132e2b99d7583351c30caa7cdf2
-
SSDEEP
1536:ieRTWoyQV5YrEichyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iUXeEZhyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2672 svchost.exe 600 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 IEXPLORE.EXE 2672 svchost.exe -
resource yara_rule behavioral1/files/0x002e00000001958e-430.dat upx behavioral1/memory/600-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2672-436-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/600-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/600-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/600-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px5BD6.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47C64FF1-BB41-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440469320" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 600 DesktopLayer.exe 600 DesktopLayer.exe 600 DesktopLayer.exe 600 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2528 iexplore.exe 2528 iexplore.exe 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2224 wrote to memory of 2672 2224 IEXPLORE.EXE 33 PID 2224 wrote to memory of 2672 2224 IEXPLORE.EXE 33 PID 2224 wrote to memory of 2672 2224 IEXPLORE.EXE 33 PID 2224 wrote to memory of 2672 2224 IEXPLORE.EXE 33 PID 2672 wrote to memory of 600 2672 svchost.exe 34 PID 2672 wrote to memory of 600 2672 svchost.exe 34 PID 2672 wrote to memory of 600 2672 svchost.exe 34 PID 2672 wrote to memory of 600 2672 svchost.exe 34 PID 600 wrote to memory of 852 600 DesktopLayer.exe 35 PID 600 wrote to memory of 852 600 DesktopLayer.exe 35 PID 600 wrote to memory of 852 600 DesktopLayer.exe 35 PID 600 wrote to memory of 852 600 DesktopLayer.exe 35 PID 2528 wrote to memory of 1104 2528 iexplore.exe 36 PID 2528 wrote to memory of 1104 2528 iexplore.exe 36 PID 2528 wrote to memory of 1104 2528 iexplore.exe 36 PID 2528 wrote to memory of 1104 2528 iexplore.exe 36
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f659c846513131f55f464483fe4d507b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:852
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:668677 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51774a27417c6420a0338fa7dc4c5719a
SHA1a63d13409208d30973a4a574744762c7a7d1898f
SHA256ca416cb2a35a609418c23e83b6efdf6991246ec3671f84efb32ec03534276cba
SHA51281e28dbb3282c90da1ea4b11c8b642c93069ad70d9d57a3b4a6551c2589a22c5e17db7b2d053a69b11cc3cc6df4fe3d2b09efb6402274d7c9ad2a257abf57c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d280876bc90f8dd056a38892043d25
SHA18f52853df523a7bb55a50c9be848cadad6acd166
SHA2563618670559b9684925da451ea45ea487a8722bf3c2ad56843073dbd72fe3f84d
SHA5128202101f3d2143262584c84c9f6d423cd531fc5ac4bb35f765c79d151c8cb03b1d74a35cebeabe9017b9b9259a48820d98f98679dda265678889389f95697ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726bba37bf8cc4291f8f7e70d892ea33
SHA13b87b0560163c9a322c1991c18c7243807cdbfaf
SHA2561443d2916b6a82177264b04fad082e99ffa0e559b44ce75b7fa18220e160a7c7
SHA5123f1bf13f3a603f75877b8cfc21f0b491f98926aa8423be4a19579aad50fec661253efb809ccf6347c025b323e6422cdb7d29459157ef12fc88db1f395b62b8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502af869935dacb825bf70bfe8c1f87c9
SHA18ef05918bb33fd01aa39fde33971a124081ef746
SHA256842b0f623808c9787f7269b26319281a97c0a25259c15298c32bdacd7d00df23
SHA512ea3a7bc6835b22b62c10cd86d8bf39bc4651ee8800e485549e039fc269ead514fad6a5c622a2bfdd5b5f55b93124e64d3496e74362a04c134de9a3293e4c2e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56847c26b40fe6abcedd8a9f78fe75ac8
SHA12c44397f47c7b8a02de18403095c2d2982713c38
SHA256db70a2083eb01fcc5aefc3269310ad58f4bc25532dc533846b8b4443da6f5bfb
SHA5125a848f18342873e0aacacff4db53060358af070648ea34685298d1e071eaabe8b9b97edcb5b1b4dc1b88255f7c56618f9fbae613d05379866356fa39e1b3cb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdcd36bdc00a250d960a61571454219
SHA1bf5f64a7f846d8f16ddf541f83b696690adef65d
SHA2569d4109553ae14b96a81bd96c65725e5d29cedcc75d6b31ddad4c59cbf576d7f1
SHA51242ee43459232a7af7e2063903f097e9cebc7868375a03320736d4685454bc5dce41b348a8f1f2f7dfd513f307b86066a8116189ba6c1b2a521af0ce5eb6ef847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f044621af54e16d200f52dc9fd73625
SHA1423a8b91ca21043aa00424a08769faf4822eaf0c
SHA2564cfd26533c27127f7eb2cf86d5ca69c97569f2c53d49c1256999992eef305954
SHA5126bfd64e09d8c1dc0ce26ed49b122bbe70af059f89cd131931fa84a5aded6ba9ea388300268ed79672ceae94d13e252df0b3ff4808c6c91337579ef70952bae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6048e1ddc73daaa547a9997451aba7
SHA1b8354008b64d6ffe6b2139d2dc0a30784aec7fee
SHA256aaa8817b40c35cb8181d38ddc2bb6abe854c99868244209c5b08290d6073bad5
SHA512fbe071e879345e20cafd0ed3047e01b8abe21062b6500e36d3447e0c3407588f52e7151c18b0c35c9245f82f6ab72f8a64200dfa497ad5fb07a8e1d0686e06ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c81c7a1041a10c6919f3e6fe7f974d
SHA1663f4bf74c1d887cab7f068c48fda982f7c7c5a7
SHA2567c8c04f649fe08ecd04871d99e91159ddcda6262a5d9d81d771794e978b6708c
SHA5128110c920a3b96e7a0a16b656808b02d58ab47d2c3797b215a14adc60baf3bd1e710e2f7fcef2a1c60c38b882df15287cc9cd615e4ea6254d39d52717f6717f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da82cb3b20314185935a1dc38414703
SHA1862db920137a004753be2b69ef9cde0ecbbed467
SHA256718b94807d26f8476da40d06c6f06103c126d22caec98a389d1334e070279bbd
SHA512c9d57250fd9f365c181b219ab2c6286b4e0e0f56620fa8606cc4d1a52e361f138dceb5043951ccd806ba15b98010eb6ffda8aac78af2514c04dbbc6505317ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc7823cdaa4c8f3115aaf2a756503bc
SHA10b6efdcd73500506ad31315d7a4779bf443e6665
SHA25643fb67b3608307e099abf8d6cdbeb2580b1668011b6bb5af8b50daf6b2086e0b
SHA51242439b308a5155d30887e10ef91328815971ab45f36f63056f1a1d12c4facfd993a8c1ce4e9a51b1279ff5c2d3188f2f3a5857cebaee924c29d022e2a8131893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f80e1205b464aaeb7ed1000a481c1b
SHA11772f4902585e020c6f2e7feb558378ab161d1ff
SHA2565a292059e27f5cee9d32cd83a928364a8e1478d791a5fdcf2482cdaa3513adf8
SHA5127c799e411ece89549374fe3e2668a3f82164fbeac8ca43296336d3ee5a1533a05989e6b7af449068f9a047109ced3aed60836fc5441a32c57c6d79020049985f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7033e2d292038a1793bf8a80b036516
SHA197ba1a5181144b00eaa5cee420579435e7f7a6f0
SHA256e43c9b292467ab57e4a905750ce7eb6d566294a0548113fd293cbb97a8cd237b
SHA512636cbd60320236299515da3bfc36746d4a9fcb57e8471e73028991431eb1bddabc4889f8dedc6eef948f5acc4447a9136dcfb201e152f408e8b0f5664cbce7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515136828675c78ffaa23ac8c5cb2396e
SHA11cd98255ba908ebe154282633e748070ef3aee81
SHA256922d0274eeb32cdf835e9d9e39ab8aa2de326e95f4b2696a7dd848780675aed0
SHA51244faf90a28e6686f26dd5facf6d10a2fb885e30bd545679a0f509c428fef9484ef80012ff124eb62188f01a1c9e0dea4cdcf7245cef45a02920eee8cf4ffcf2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22510a0f615b2bb3bd83b8df18f4875
SHA1963b19d23c98bfe49b31d249f59239107f677451
SHA256ef8e33402a09db00bd0dc1c0adac479fcc26e25dd801bcf381150f052bd44d02
SHA5128c03e87ad5a14a47df7e32f2ef4945b543099095da511ebdbc86cedf226e379fb225a0e439de018561454017dbcfffc2217b1d16048733590941826df68521a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079d8aa6b5d477dc868caeb258475e8a
SHA177dbbaaec3a315313e3a38aa5606accc43ece92c
SHA2569c33cc44e1569005e496135ce713a9b85a845c3ee5699f9717ab2109e83319ca
SHA512e2514506ddc98e9f222a994a87df699cd4790165b5ffcec0c0b97dd6c4d0ec2701dfa58df41ec84d359e5669865f1143e7b4e0654161acc3a75d941d96574ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef5661c071d5d264c2899879f3dae60
SHA1b08622da6a2df07c63c9b41b7acb65bae488312c
SHA256e968d8220f198d364cb6065735105b4de7368be38bf1db66582c3faafb45b213
SHA512f9c91e598637c4190aa387886f0747a218a5545590ef898b1f649903444b5d1c217c79927aefe322576b297898cc843e18844cacb6a88d356d7b11ca66fb4a0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a