Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 01:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4295ca7bac43914f477b4c6500e47f60.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_4295ca7bac43914f477b4c6500e47f60.dll
-
Size
144KB
-
MD5
4295ca7bac43914f477b4c6500e47f60
-
SHA1
d1f7dfb41294ae6896cd8d86d01500f38550db5d
-
SHA256
ebed002273d26d9695b8fd453b9d083ef10c1b93caba864b71108f9dce03a635
-
SHA512
d84eec8461ed2fd4a5eb464daf582ae56edc52c088b669d42d1bcc26a7039fa80f8a75d6f26a3cc296240f72f42a2ef4cb828459104a59bd0fa1474e9a3572ca
-
SSDEEP
3072:F8pwBI+tefsnb/lDY/X/KVv6Zwm/IETd8UUjis+s4:F8KUknb/lEviViZwmA4d8UUjifx
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2104 rundll32Srv.exe 2784 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 rundll32.exe 2104 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012281-5.dat upx behavioral1/memory/2784-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2104-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2784-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2784-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2784-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px73D9.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64D1B241-C7E1-11EF-BD4E-7E1302FB0A39} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441857502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2784 DesktopLayer.exe 2784 DesktopLayer.exe 2784 DesktopLayer.exe 2784 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2504 wrote to memory of 2928 2504 rundll32.exe 30 PID 2928 wrote to memory of 2104 2928 rundll32.exe 31 PID 2928 wrote to memory of 2104 2928 rundll32.exe 31 PID 2928 wrote to memory of 2104 2928 rundll32.exe 31 PID 2928 wrote to memory of 2104 2928 rundll32.exe 31 PID 2104 wrote to memory of 2784 2104 rundll32Srv.exe 32 PID 2104 wrote to memory of 2784 2104 rundll32Srv.exe 32 PID 2104 wrote to memory of 2784 2104 rundll32Srv.exe 32 PID 2104 wrote to memory of 2784 2104 rundll32Srv.exe 32 PID 2784 wrote to memory of 2788 2784 DesktopLayer.exe 33 PID 2784 wrote to memory of 2788 2784 DesktopLayer.exe 33 PID 2784 wrote to memory of 2788 2784 DesktopLayer.exe 33 PID 2784 wrote to memory of 2788 2784 DesktopLayer.exe 33 PID 2788 wrote to memory of 2672 2788 iexplore.exe 34 PID 2788 wrote to memory of 2672 2788 iexplore.exe 34 PID 2788 wrote to memory of 2672 2788 iexplore.exe 34 PID 2788 wrote to memory of 2672 2788 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4295ca7bac43914f477b4c6500e47f60.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4295ca7bac43914f477b4c6500e47f60.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591f04e45f63371d3f91112c660fd02b
SHA19d891c192c95ac8cdc7977b4b4f5ba6fd3153e44
SHA256a5461cdb9e12381d10670b9151edf673a45a47d984f365531466b7a018c9e3bc
SHA512b902c95e4faeeea3ca9d082dcb4562f5b84a06bbd5c257026a6648b6619d137e8f776b7bbcbaf3bfd3837eefb321782e386d88cd2f284d24bdb97c9cb49733c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51caf937f0f77b2e73a5b32bfd317f8a0
SHA117a6a8e777a0f8ae80248350fd79bc4c7f34fc6f
SHA256936fc0abf2fec410cd2827c44c4b32308c1aef26283953bc03eb5620fc4b499b
SHA5125ec2eea455e373b1d5fb5546fa94193d6ff3c7acc91ff1eba2a767db03aad38b61120392be6c589bee18d9b65bb5bd4eae3cb568947588ad59beb9ed1f0b81e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635bd444e286e4aa3a0aa41055f99000
SHA1e9e4f4cc049097b30b3eb401c853f81bafc889d5
SHA256e6268f1b915461e1b5379365fc348f4984b51e64fede80d4cba3a4c32e6785c6
SHA512697b8fbc0d03c1e5d823849e3515aad242da601a91037fd9aeae591a4ec0f9649cb2023200d0f9f0514b81809d882de508b96c276bd0090c7b756e2d83ff79aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581444f1cb3b55bb8e6ab830a2971b1bc
SHA1dd63ec26dd34099b7fa388e37d517f4f195082ea
SHA256f4d0ab62c41d7367f03c82513867a649b0ba5ba485bbd6eb3d507a23d4425950
SHA5125cc3639ca60f008055c07c6f76b521f261ac8991b557c0e8a4851832739c64a511b2ec32c986778462057f765fe4e8ba8cb714e1f8d8bf8a06f48dccb3dec174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56137e7a92d11bd7fb5d7dac079d540a4
SHA10e18ed17aa24d7aa718659ed2fc1d6f57fd5b062
SHA256a466ece2118d105f9070972631aa80b7a10921899d3d4c4c8adc8bab3dd5eb46
SHA5126e62382e9c231be108f782ebe7e89f595ca83cc06259e75bc27eb48ae350f5531d7eae54efa3921f805b077abe0ae3e3cc1c8f99a32dbf9e106c588dcf87c72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2253fc56535a4f10d06141ca329a18
SHA188343a05ee635ddbd83bb331be3fdfbc2ed816b5
SHA256b9d71af07b1ef5bcc1012b5945b3caffa607d8a70e9d36ca0818d74973b0db88
SHA512219a4b8073598ee3c133a8483da8b05b7ec96c601013c5657c9de8cf4bdf424084de13bf712fc20c3465dac31fa07736b5d98d44a3e8e760f5915eaef55d1a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a18bf416448ea76f7ebd0381fd6caf0
SHA1deb4605827897bb147fa16f7b3fa86bc80bf19b8
SHA25618e05ba041fec715549fe769fe7c070d05618f2c02defea304c78600a398cc90
SHA5120a9ec2f67a0de6dd42b80ef9a0bbc525007cf8497a58f5a4c407ee8bbf106bbaed28938bb8fcc9d0ddeea04163db933cd68ebec38899cdaae637aeeb6a1efd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0491cf39dc9aba05f9df28a6a9d2cd
SHA10fe544ed2f7ed55c75e241f3bb0ce47797cabf58
SHA25647b31db43efb3614f6712bfd6a33741af0ba06a3d0f4a6d0294dc1337cf346ce
SHA512e6b506c0a8fc7404e64a09d7382290b13c99e4b05a8462febe0d08f8036291b796b3ab92cea3b763e4b88a6b1e9c328cc5c808bceb9096668b7e40a4a78c3431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a717b6197a6844487dcef33851b02a1
SHA1e911c81fdcd65ba9fb04fc6a812c4f814612df09
SHA256de4603f194e8bad33718cf6c98c1b64f068cb2eb91f83fbb77fe03acbff72741
SHA51293b5c4e841d85e2d886250e94c81ef9930b7ef7779bf39bf901cf6d86f1aa1f9ce6df0b6e2f0fcb0ebb1e37a2a68f2a900890e5c0976267722541f64b4a0f180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866888598449c7af8e8b9358a4a9c6c8
SHA1fe9fc3c700001576327d31366f120620a8742c38
SHA2562d7a8e3148cdd5a397f2e291622ba3351f7a5089ab32187880a861fe54830883
SHA51271db51777639c17278c074c7573022b4abd81b7a98fa9b25deb98cba6bd69afa9ad0977620a492d2138df35b53cbfb635fca32d52147dbb9a5431e74cb5a9032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041ef8312a3f2d3bcd6e3ac0f2d5322e
SHA11180ed5fb85d459ff0a944f0a11a3266634da972
SHA256069b3c47f578423e0eac42ed32a30ea2563d042f861c33128be56d3026f7d5ec
SHA5125ee7be595e0760e1f5706aa43c6069133b76ec4eaa42cf794cb2bb6666d21035bef203312007a41bc2c68463e9a6647c99b7abd48b78d1cf0b0e599004dcce39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdff74063f7dac1e1b5aa368df4201d9
SHA1fa463ab8f6b1796241457a6dc81d09aa51c583ee
SHA25669b97aa326773bdf3a448accaba1fdb4c2c77e69446e63097b722dc29caabaae
SHA512ae082e87da90a9675d36343c39dc678109d2a6bf37574fd9de2e8cb9a64bd792ba21da5bef8f0b03a24b786196d6ade9b883ead19411b41435d425f59fa634c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d94cc745c311f82a10a811eda8febc
SHA1faff3b63d3339eea231a6374942e3df3583c7a34
SHA2568049b85fb4adc2ec72c3154e02935b26d19375e98b7721b588a941765e8332d6
SHA512d4bbeaacfb301b347a021cc23e36d9faec0b90cfac062f14586748878f5a6da597e890db91245e3526c33e36d62cd9e3f0b4e887c35425d4dc2ae24ba69be0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192e439b26eb79854aa900cd2d1f45ca
SHA1d4904c369c02113f5a83dad7d1e6f448520597ff
SHA2562ccd0fe932feeb7f83a97e73c84ee87b5addd05f834f925e894ff4b28a1c1192
SHA51295d70fe81231548551ccc4cb5d9f512b695d7250a26a66f8450835ec831a4ed692f6f30917afd927217c1dd5f644b052ea652b4a6b449b56f93b8a55e25de519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbbcddfbd206173f3f7e07e0b7e1617
SHA1f229bc2daf9eefe8fb879ecb9d2e35bd27cd03c7
SHA256584da9f6d84566219066b134868c123ec557e26c12f4e891e6877f28c5f57783
SHA512b12335e8a4afc7e768690dd827b06dc03d9f2fc4330ff31edfaec04b5f5b416d5353a97fe73dc2accab6f3be76b6c54c6062cec35f761f397f2eda40a35bd276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0c3d3fe73d4f50545fd936a09d43ef
SHA144111ae60037b0c630f6bab91a206e0c16745a3b
SHA256b43bcf4160af4def1d37e735ff78a8bb995bae8dff7c521c9f20c3606a2a7a64
SHA512fad4082da45a24d796654f70fa199fedc8e55fb24b9077283b5a580318d0b46c4439ec26788e0fc679212c501e985babe1a9ebf36d54219a558ef4892e7b0de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb8a8be25c41a146bb84c54bc61ff1f
SHA128a383b12b51b99cec5022e1738fe0d511c88d77
SHA2569d73050321321c4c86778cdbd3f1df16b0a73723614e3329a1e7043a5d999ee2
SHA5120bc814ffaee673ca36fb5221d89e25cff3435f49b6e52272a4a6532d1020a7f001462fd4518c4be38af51d1d1c21a4c5bca55f64d2483381e67caaf648242567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f63f9ef5c7a8f3dbe2ec1ee0d8e834
SHA19bdf97ad140a637079b4e902319750854c1945da
SHA25677685956207b8828fc7b9c0f04066e03ec9776532c88a327c9eb12dbd386b33a
SHA51290226ad1327549901d9331931909d4c585a705ca67af8c796dd28ba83c7f63e65f823577d027c8e2fb80d1fb677bf7bc1aaed918b6ac4451b0e1c7ba32c28645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58947abdd0f16331f407beaef70d51027
SHA14b1ec5f44c9901030e312b39042247902d6bbd10
SHA2560f9dd9b9f7fe4e740b1c8a04ead1bb6c480ca168a8ab79684f071c9f2aed65fb
SHA5121642600b23c2d926679ef65207fb43926bd8033fedf4eba06dc6e4982129effb9ad64765949120b4f52cdcf1d0dc958a05badeca352e455fe4935b2b655e975c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a