Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 04:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll
-
Size
184KB
-
MD5
47b5d09bd1c61d1c0d90722e70881360
-
SHA1
65f1dab05506e568b8c18ba8032cf624fc993f20
-
SHA256
3e77d891d7080334802ef515861b44c9a4704f85413e7d386ad23136107d2a33
-
SHA512
8756929fe4bc8d1ddafac58a3a5385f14406b21a3fdc343af7711a96f3f76a01163cbad32a66e015aa8562e47b9ea9a64f5e99d2360c2bc2ecf8038a7ab15e86
-
SSDEEP
3072:ttzFx8pZDVtxurqn83eNiDcr1y7uEi3Oabk2leuuSWhdMZqO2MSQVO++3U2Pdvv4:MDVtxuK83ey7jwO/dVSyO0ONO+cU2P1W
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2596 rundll32Srv.exe 1696 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 rundll32.exe 2596 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/memory/2596-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x00080000000120fc-9.dat upx behavioral1/memory/1696-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1696-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1696-23-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxC774.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5DF6B01-C7FB-11EF-AC67-6252F262FB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441868778" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1696 DesktopLayer.exe 1696 DesktopLayer.exe 1696 DesktopLayer.exe 1696 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2576 wrote to memory of 2580 2576 rundll32.exe 30 PID 2580 wrote to memory of 2596 2580 rundll32.exe 31 PID 2580 wrote to memory of 2596 2580 rundll32.exe 31 PID 2580 wrote to memory of 2596 2580 rundll32.exe 31 PID 2580 wrote to memory of 2596 2580 rundll32.exe 31 PID 2596 wrote to memory of 1696 2596 rundll32Srv.exe 32 PID 2596 wrote to memory of 1696 2596 rundll32Srv.exe 32 PID 2596 wrote to memory of 1696 2596 rundll32Srv.exe 32 PID 2596 wrote to memory of 1696 2596 rundll32Srv.exe 32 PID 1696 wrote to memory of 320 1696 DesktopLayer.exe 33 PID 1696 wrote to memory of 320 1696 DesktopLayer.exe 33 PID 1696 wrote to memory of 320 1696 DesktopLayer.exe 33 PID 1696 wrote to memory of 320 1696 DesktopLayer.exe 33 PID 320 wrote to memory of 2892 320 iexplore.exe 34 PID 320 wrote to memory of 2892 320 iexplore.exe 34 PID 320 wrote to memory of 2892 320 iexplore.exe 34 PID 320 wrote to memory of 2892 320 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139db2073a27eb77d8695e61f4159c65
SHA18284766feb8dbd47be009142d0fa662e52d6f089
SHA256340aa227f82eaf19b5c399f8ee32507e7c6e475dcf8163583d5475a57b227f9d
SHA5120a3946693df55232c260c9e056e6576d267df39a13998d24e7c4dc41ff03e0411c462dea636aa0d8cf9cff8ca2685b0dd781de11f48ba910090ac42dbd1593da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e19b1cba31d562f02b3b29c94e83c2
SHA111ed2593769330afb8cb2193a35617fd39215b33
SHA256704600ca955492c5afbf352412332c7814f394aeb92b4f3db6253686bdf1b0d4
SHA512f7676a1f7833a80b4f86dad358b1833899cf3c70f516debea2e76e8250ad78338dea5290a4e3aa8dd6942023040eda158fff23fe7e372f55704a4e0c4de7c593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b847a71cb08d7f208ae85bb5042d6308
SHA16e0baaeb41364d6cc3dcf7880d7a8a3d57a1b107
SHA256b17a8d3c02806935a0de09a48064d8b4b987ff7c2542580408529fa21856ee62
SHA5129df2a4da108dfdb7cab8a88d01b4a0b6a4389b4ae394f3006a6def710c0d073b318e1fc4b3f8449770a45eec1852dfccba76f7b8212a139c90116e7abf32dcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92a3ebe17b8f99220b5a51f140ebc4f
SHA1105f8723b8f237a6171514e424d016994f926dad
SHA256b4aaf988ca36791cf87bcba43317db3b68e965c423a1423bccf16845baa436ab
SHA512c2672c42b7f0573c5ca2637026de7262bfcecaa3c1f358a9e75d2f8e3dbb4d49775d4429f5dc5f50d3bd957500cc7309c648f085eb26a0b1882a6b9c2536bd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c43249b9a1b77ce3c1b9ebabe23ce2
SHA14af9dfbf04e368be0653135a1edbea23d3a0cb71
SHA2562e9eabd85241fb639606c25dfe12d9b833717507b54095f1794867a3c21fff90
SHA512515648604e07b8824b77c1be236b3e3b38b90412b1e49c6ff741bb969e60650caa15ef0a1156286b2ae78ff07a13791894c7490d9976859d1bd063d1719086ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1e417a9680cbe19c6a846ee23df745
SHA17bb00380fe9c5703cde973ebd50707075423d24a
SHA256e3a44b5ecb7aa6a01d03572aa1e9cf6085a9b5cbd45ff2da60dfea9d61379ab6
SHA5120787d934e60d6bef01ffdd7b321faa2644915a33431e2ed9fdcd5af3a8474d6f6e0fbbe733ad061594ba4789624c43e73c341f7df995c6a48ee4405f0f04a85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55757fb5d3443ac46af3201b289b70f6d
SHA1dec7fc2428f974882b9e0371d0721debd71ac06f
SHA256cb1d14968d80f5b3b2c304908e66c6a546c0139dd9765d31f54d0534d6cc7dab
SHA5127a8bb9bb2f489de9c09938f55fe5da4973a163a2cabd76c08c9ee86abf43dde532d2196cda890c5251445684be4a2c1975d5086c2f239bcd65910af37b45c1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c25993e518875793f6371081163afa3
SHA158e805d49c19f294b333f751b4d425a95c5b647b
SHA256ba45f45c9352f053a3d57fde42933c1346aaf14332408a9ed7ced1ffdfbb9336
SHA512a65983f5dc36421de260c052ac2167971aa9c84b3d876f311106ff6b97fcdab53b9cee9ec7e16a6713ffd68c97b28034efe09ec92a97c1fcc9c086f464abdb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59defdedb05714725b702c070e66ba10a
SHA1bcd22a90a86913fc9db962e1bca073607673c84d
SHA2567a05e2b451b607262135d1681381981753dc6ca1d1e8f3040993aef5db116fe0
SHA512b9bda725117bfe94e2317df87918f7d2d6de4a1dae91d70f45cd74603391537b7cadba0e4790a851db2480848bc52c15ed5fb5642d831d4ab25f8db5beb784b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572508a49d686b8edcf761d91322eda6a
SHA12454cbda2b7e4330176cefc725bd68099760f3ff
SHA25661e308b744feb0dffe99039dc3f3d713460036867f473fe7eef29b93e347aeb6
SHA5127a6320a5b9e44c6d21c171160dd4c233aa7997ac694f56b1d2405d1f6a4079a6a2b18a43bb9827d7a91b981421cd2b5b6480730e2c4ea16653d2e1f50b35f826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9875b0808e5f1714c1ddd5d5c6e4412
SHA1ec5e6cccbced632c8533dd25130688519804f33c
SHA2561ada6333a95a24aa52e122780023dfe93da753623cfe07e2b6574551cbaab7ec
SHA5123d42c95c9e25154e5d0f9af597b8cf0ea44058d1e3bce60e2eac3873508edce37be78750d770ae3345cf454ed38ac5f8580631fec822421b788b007ddda8b99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6164d14a01182d614dcc9b10837df5
SHA1115c6eb6c8c0005b448c2ecd5bca7c3e337ea5d2
SHA256ce2403a5a586e1203eed3e445e33ef011c748960307c6614f75633f5dd6d26e1
SHA512c1d3790916ac4060b8dead633a24033963abf2a2761b9a3d81b68f1ec926a62c120aaf2f80b6d739764fc9968c1516c2f48707586cd9a56f5601f041f550dbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707813f729cd94e4033f59c09a682d56
SHA15c6762063bff43e773c0940986e497d4a274a1e3
SHA256ffc25bb2ecf66ad3f70e7fa35db994b73054bf63ada1d9134daade9d9352a439
SHA51263fd2cf04c6a9bf838adee5bbebc76f4456bea955add247bf5b8d9edacb3fcb3e12b28e0a1c53fe6725bd93b52010252c31de70d800ab4e7d0d765b4d6ae83d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1aa2d4b74a9685e399ed98b78731b
SHA1cffb943569d7bcd681b773b048b817c579682019
SHA25643d83d2a8b6993a86b8ef1c29c9205d3d44508b0e0eeec319960f9adf38a6c84
SHA512345ef96c478c50fc308bc8d7542cf565c6afea32897e1d61ac7fa477219aacbd6eaaabae909d580d81712c0518acdd4f4d7e88c336883d57ab1f023fe01a3ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e13221d27559497386141d374e7fa8
SHA12f6be2bd464fb9321f2b5e70be0917f775165cba
SHA2560eb2de4af8e9ec75dd3c3ce6f6bcaf817c4d53e36b283555862e8a3ce0a7b754
SHA51216c593456390db153db4596151513cc6f8ee4cb2d92aba44ad2d0eeff4088938fa8b1121b5c5f3c9f2a789bf97b85fe69fb5a65747eb752d32ce677192dd4b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eda1026722e11c81b6937c2fc7bc47c
SHA1a8d75d8a6b712a8e1932840da576a4d3cd0e93f5
SHA25699d084f3cd7bcc8af4bbc64c5e84d8a88563510e9cb7d5552514db9407a9e375
SHA512a9f927fc05128390834020c861114305a2190515a7d09f118c36bf443cbd137129b92167b83a1b9d0f3a8ff2e6bf78f4ac938cf9ae1ab23864d39750c9152cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aed040521c339e6d5873fdb4e612b01
SHA1c866be1a96a06f12ca9c793ca8ea54ba4e0763ad
SHA256955b06427d4370df4db6824e54889db1a4d55086f16f700eec44c857e5f451ea
SHA512286422a39c8b8b3c3463374f6ed576362b9c8bd955eb8e838e3741744694d3c2bb02567f09439ba18dcdcf0ffd3288da6e0d5c2f59a23ef2044e1713e66f1843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368c479188835acf574f5ad47fa2561f
SHA1c19ca0dbd69b30350bf9c307b73e6a425ffb45df
SHA25667658d388c49d7417a5099743a6596df3ea1739b8f2381b2d3ddb7ee2f606b4e
SHA512ea8147323bbc6699a6a61aee3d21edfe662034d8a80a50a2a58a3ad9e2ce0367156aa4e7240a06609cfbb28e0f52efe9899abe7f0f75e4ce96ac6ec72ca98960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c19e061d727d24b44ade62bcd936ab7
SHA14a86472b021a28b074fcf37c1748686a4d917539
SHA256964ed5978d26f7e9a0111a0be68d2f763eeaf2ab1b9e524d71de30e1e4dcf89f
SHA512137e61820372a94e38b8d5840b784048faa89afe613523734aa033c221100a32aade37bce8bcec0f019f6b566476eacf06a91fdb44149a6595e21f2a2208ca13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a