Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_07c4262a7dfbc3a9ba040b6f07ac4850.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_07c4262a7dfbc3a9ba040b6f07ac4850.dll
-
Size
224KB
-
MD5
07c4262a7dfbc3a9ba040b6f07ac4850
-
SHA1
ea0f73ab2d794e09c8a5e6949b8d44cfeb9b902a
-
SHA256
8426b75e305d00cb8a19703cc5d961c74bebf63cb1b7905d5663f41c51d8d424
-
SHA512
f6934d7695fbfc8c1116b1a669d6046fdcee9ae81063c3219a9541d06fa73b56abd3ccce4eea9fc82f1dda9fa31218ca100a09dd77f83616e77130d1ff12f01f
-
SSDEEP
3072:lYj9QUwuV6ywZeDD2QF5jETzTNj/1uYiJ30Ilv0X+HpcFyQBcuUvWJxzDtupGbcC:GjjwByh2YlEfpj4YikOHU2uUMxntXcC
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2952 rundll32Srv.exe 3024 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 rundll32.exe 2952 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012261-6.dat upx behavioral1/memory/2952-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2952-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3024-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3024-23-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxDDA2.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1A672A1-C73C-11EF-889C-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441786737" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 DesktopLayer.exe 3024 DesktopLayer.exe 3024 DesktopLayer.exe 3024 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1688 wrote to memory of 1768 1688 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 32 PID 1768 wrote to memory of 2952 1768 rundll32.exe 32 PID 1768 wrote to memory of 2952 1768 rundll32.exe 32 PID 1768 wrote to memory of 2952 1768 rundll32.exe 32 PID 2952 wrote to memory of 3024 2952 rundll32Srv.exe 33 PID 2952 wrote to memory of 3024 2952 rundll32Srv.exe 33 PID 2952 wrote to memory of 3024 2952 rundll32Srv.exe 33 PID 2952 wrote to memory of 3024 2952 rundll32Srv.exe 33 PID 3024 wrote to memory of 2408 3024 DesktopLayer.exe 34 PID 3024 wrote to memory of 2408 3024 DesktopLayer.exe 34 PID 3024 wrote to memory of 2408 3024 DesktopLayer.exe 34 PID 3024 wrote to memory of 2408 3024 DesktopLayer.exe 34 PID 2408 wrote to memory of 2644 2408 iexplore.exe 35 PID 2408 wrote to memory of 2644 2408 iexplore.exe 35 PID 2408 wrote to memory of 2644 2408 iexplore.exe 35 PID 2408 wrote to memory of 2644 2408 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07c4262a7dfbc3a9ba040b6f07ac4850.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07c4262a7dfbc3a9ba040b6f07ac4850.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53f6eea78dc3065df23b0ca013b3bd5
SHA1fc14f1dd0693d4688e3efa269bfe2b65b0b851bd
SHA256ab0f7eafc35654dee761e3705da965c8f5b41cc0b7c4d06434b9560fbbc00c0c
SHA512abdd2e3b456d7c37c7c8912b74bed42be2069d541b1bc7cb4f357cdd3f5614105edc8459627a504e312c52242af5f1990583641b83136492d126a671c6de9821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58118a746934086bfb2d3a99105b4100e
SHA1b641b331ae89b6ab966fbdd8a66f1c5ab0fb12b3
SHA2568c41d902e113bb10f96fc15dac3bceadcac3b153608c46070ac30d7665b622cb
SHA5120216849ca437c99d76850c896276ec0c8bfdc555ae83409c5e65ba78f1a45e6ac05ede5e09a9cae80bb7cba816117440bb8b5e670d50d07a28de0674fc8f0ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564600f67173055750ea9af75aa22fe5f
SHA17aff4fcaf1ca73ceb6257dd6cb246e3df25b4a21
SHA25614f71d5bcf532806acafdd2842259790feecd337c1c2bd9280852b6c0ae33d60
SHA512f83a444db89441de614659c32ca8f7f3ad49ae4dfd2de9a3a7fddcae0738d1970e9d7fc86455935e2e69c64d9bf5801d2fe18d941e1becf91b1fcb9022f99a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529385cf6e1775077a7df4aee12dbe1c9
SHA1d869412e8b2010afb2c380e45562a0119b463a4d
SHA256848855aae329737c8ecfd57a59853f0fa82cb93a88b471ab277f0781d6988aa7
SHA5124d3edb7bee356aaa932bee314f7363564701faa0e47fabb09d594a01c6a7846e485703f1aee8b7db3c83358dee233b1d1a5498c4976ca102c352883066999e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b79201535d48a63da978a24357246f
SHA1055f61dfa3cb95636b6880c07c23ad2c40baa762
SHA256f9fef1f2715f69b496e0dd73923664b1d8423bc9b787f0716de5b26e446e1510
SHA512fb778f1d744b0a71df64bf6b7b1624cfe981e8dd5f3269336417ce6bbe8977d9e419986335dd1ba9b67ba5a2907240ce24427f0055503cb8f4a67525278bad01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b118faf9c897ab7cf3865c812cea6f9
SHA140cbda270828e06c6f994e43e7eb3a143e83fc9b
SHA2566b79797f9c8dad304ac3aa30d80d5775897f5bf1bbb6252173735c76337b6500
SHA512e9a81d7dc09999e67483de65e0c2cdf5efaa3703226634f96e5e6c58910c6685d2fedf95ec2a6d8cdeae7f46870cbb2d24eade88697bd93e213b78ee5b101a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b981f33d0e91cd62b94615e0b34b8f79
SHA14010a4012d78e888517999a6f653f15b0772fd8e
SHA256d164f24d90558ff23c9a7786bb4e7b8eb5e8d3916e59cb945b155f1da033a31f
SHA512f79dcb31833d0addf458a916b909a8a7b8d0eed70f402f18988c53f2ffd9a4058ac6193ea1e71ae861b54d18f9be5a36d432e6a5a859a2a33fe3952400363031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76da5d2a31396aafee4b0c75f92d283
SHA116226ab5a71be2c4db8d236a8f5f48cb1d738726
SHA2560649f6e8d20f28d1937df5954658f1ab57b94400289182ecced1e156505796b6
SHA512c82be5250cf4c94a36a6a5adaa3491ed399022c47e9a4fd1078d8cfea99678dd853f2ea45976109d3b57ec800a2f72de8f19066f24cfac4e27cb91bb6247d91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a8ab88cda157299b72ab62ef4f2158
SHA12a84dc2b441954c7b5f56e044c78f1ff6eee6713
SHA2568f7360663a99152a0138989e077507e01fc7c7cc1347f5fbedae58b0e0611ed2
SHA5122f522bd64366f3c8a9c65d7cfdf28fb9b74bc5d713509522b13620b97d1f72fdf7b749d25e103c67a58003bf6be6b5202b31dfd0f7900651ab09f2ca5eed120a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbe6576614050e73e7914a57e7d263d
SHA1fe525cfe1cb4dd698f2f58c1c7d84099407bf669
SHA256b9ebf2ffefcf9964800ebc82735dd313db05e79e140083e5e5082a3f099f3be2
SHA512e65dc888b37e493d9ddf28b535f86e8496c414fdc0218eb1ff335220d4d7cf91460a76380b77260e5fbebdc05b9fd085bd2165fee547860fbba4a8858aa94c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887d8125e9378cec7f17358adbb9de40
SHA168ffc25ea2514117774c5e12ebbaef2bfdce24d7
SHA256e486d473ffe72cccfa6b0d6eeaabfb304f46c801157f100562d688f6666394b9
SHA5124c6680b675959bbc807d490627ad308a2621b11ed462d76728975f5da45784de49e9158352e0dd73327fff50f6cb0fa2ce850cfd8762ab5acfd20057423bf9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6e118b3479d560e301dc15c2b20b87
SHA13cbbad5288b47fbd82bd357e448321ac0d6d421a
SHA256ef9730f6d3a23738ac5690fb98bb1572e6132845a6e4f9ba6c2ec10838fc6c41
SHA51295fcf547f1eccc4318df9a3aaf49dbac4f29b3832aae8e0e91371d623e68dea8de4c7c8ccc283fe56d30cd9b5a5bb9f2901c59ecc9138c184cb7d326043a46b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584addff8b5099d907df596d0cde15419
SHA16adbd1b2ea87ad4dde535b56b99df82af28b6e01
SHA2564c912b34fd2621a16ba2d47c32150a42294fd57a214621cba618ea3cc46aa067
SHA512ab26702aba81c09fb86aba356d35330ad0c3690d5970fce73eece5c26a9178c9d3ebcce440978aba46945149720d39cee79b59bba55b0491e3e34931fb7032b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3521e4886e05a33523ea29ec290184
SHA186c0adbdec8eace501e2ff89020bd5dd101246c6
SHA2561884a20fd472dc9f2684135c7114fcbf60570da3f3f95f7d8fb87eb70f188ba2
SHA512ca099674b8029b6685d76de7251e6bed75dcbc17d02c050c687a2b455e875f354cbff4764d635b3e1b7e449c93cb359c200c9cf01995dbd41f1f563c57fa299b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c0a2fa6078f173845593db5bd9291f
SHA1f2c613bc89b0d2571e751a580a5cff0fa29627e6
SHA2562e42b03942e6a54107b60c4137634955566c0ead15c09b62b47514cc8754da0f
SHA5125d79adedf6b46bb69eeceee5556f995cff24b2d2399ea1edf447c48834e436eee6379803034d60792d6b25a1db4a9bea51ba6bcff718c5d4233a5e80e01ebc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129a3c15d031c0d30e3f0083b916ec70
SHA10dbb491a4899cb1538d638150e5d2bff1ac869cb
SHA25607e23b87d4d2cfda781e8114a0e588db3f82a5a12d458cf70d96a302ccd5250a
SHA5121a87a756abed04eac729427467d3537aaaf4787b8bbe433cc93c829f620ef52665f34103f98d6b530a302aad972e9ca4ddb507e2f28b23360aaf4ae9ee3ef096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d98cbba5ec50b9310295f166e6b81ec
SHA1c5c57d0b7724e377b2189034c4aa94fccd9249c1
SHA256e62219ccea06aa7b1d46b59bc4a668385b9291abd97876b18d518bf848085236
SHA512040abf7ef8ab88ffe5728b3ec675cf5e605e9b5f81fbd3cc45f4dca565ab7179581690b9e90e40af9a24e0214656943d233c643f4f9d6263872266aa7308c641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65146fc87e755ffa04242a362cf01d7
SHA162be786e4dea0822015da25945942c34706d701f
SHA25620f4b20d0f3d6964759d5bb1d74b602c61cb3b115bd19d0c8e71b121c97fe63f
SHA51281964ad0df35bd0fc0e9079d481b0d2da22691640a1004e307484fdc5527703114e69d602ea6971b7ec23a92b20850830b4ed098fa4f9caa13a84e0c8b07a08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460c7b4e04fb2a91d4baada781455ee4
SHA1240047a0126cc0157ca9ea9a79fdb18f10b8069a
SHA2562325c8fb1cc90211cacebf710228e600a0758ecb0ca579441c577272649564e5
SHA512c46cdb3e18f07588ad3031cc97bf7b6bb1d06ddc83cd5ca5066a84f7e81cf09e6ea456f03662c8649d79c8291cd127f1b6ee3fe1576165d95030324d9c5c7cfb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a