Overview
overview
10Static
static
5JaffaCakes...aa.exe
windows7-x64
3JaffaCakes...aa.exe
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
10$PLUGINSDI...nd.dll
windows10-2004-x64
10$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
10$PLUGINSDI...em.dll
windows10-2004-x64
10$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
10$PLUGINSDI...om.dll
windows10-2004-x64
10$PLUGINSDIR/xml.dll
windows7-x64
10$PLUGINSDIR/xml.dll
windows10-2004-x64
10$TEMP/$_89...in.dll
windows7-x64
10$TEMP/$_89...in.dll
windows10-2004-x64
10flashplayer_11_sa.exe
windows7-x64
flashplayer_11_sa.exe
windows10-2004-x64
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 09:43
Behavioral task
behavioral1
Sample
JaffaCakes118_78fc13f23676174268b1d3b2aed5b3aa.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_78fc13f23676174268b1d3b2aed5b3aa.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$TEMP/$_89_/MyNsisSkin.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$TEMP/$_89_/MyNsisSkin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
flashplayer_11_sa.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
flashplayer_11_sa.exe
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/xml.dll
-
Size
175KB
-
MD5
0ad70d0ebf9562e53f2fd9518c3b04a3
-
SHA1
4de4487e4d1e87b782eceb3b74d9510cc28b0c70
-
SHA256
3bd4a099f0e0eefeaacfdba6c0ab760b6e9250167ba6a30eafaa668ca53ce5e9
-
SHA512
f75e089f7eb44071f227cd9705b8e44982429f889f93230e98095aac60afc1bdd39a010787235c171cd9fb9ead8023043b147022ab007e8cf1c3204064905719
-
SSDEEP
3072:vzjLkarn7O+n9z2L6whFtGF42bKgGoqVvbaNXubJ1JI:vzP7n7O7L6K2lqVvWIdjI
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3036 rundll32Srv.exe 3024 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1148 rundll32.exe 3036 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral17/files/0x0006000000019240-12.dat upx behavioral17/memory/3024-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral17/memory/3036-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral17/memory/3024-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral17/memory/3024-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral17/memory/3036-9-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9C6E.tmp rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 888 1148 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442145658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F354311-CA80-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 DesktopLayer.exe 3024 DesktopLayer.exe 3024 DesktopLayer.exe 3024 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1944 wrote to memory of 1148 1944 rundll32.exe 30 PID 1148 wrote to memory of 3036 1148 rundll32.exe 31 PID 1148 wrote to memory of 3036 1148 rundll32.exe 31 PID 1148 wrote to memory of 3036 1148 rundll32.exe 31 PID 1148 wrote to memory of 3036 1148 rundll32.exe 31 PID 3036 wrote to memory of 3024 3036 rundll32Srv.exe 32 PID 3036 wrote to memory of 3024 3036 rundll32Srv.exe 32 PID 3036 wrote to memory of 3024 3036 rundll32Srv.exe 32 PID 3036 wrote to memory of 3024 3036 rundll32Srv.exe 32 PID 3024 wrote to memory of 3064 3024 DesktopLayer.exe 33 PID 3024 wrote to memory of 3064 3024 DesktopLayer.exe 33 PID 3024 wrote to memory of 3064 3024 DesktopLayer.exe 33 PID 3024 wrote to memory of 3064 3024 DesktopLayer.exe 33 PID 1148 wrote to memory of 888 1148 rundll32.exe 34 PID 1148 wrote to memory of 888 1148 rundll32.exe 34 PID 1148 wrote to memory of 888 1148 rundll32.exe 34 PID 1148 wrote to memory of 888 1148 rundll32.exe 34 PID 3064 wrote to memory of 2888 3064 iexplore.exe 35 PID 3064 wrote to memory of 2888 3064 iexplore.exe 35 PID 3064 wrote to memory of 2888 3064 iexplore.exe 35 PID 3064 wrote to memory of 2888 3064 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\xml.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\xml.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 2243⤵
- Program crash
PID:888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b77980f4b5e5d0f3c2abeee0696a195
SHA1d1edf498b4c564d4aff09d538a35793ebdbc6782
SHA25697e9689f8fddb1ca10e03a9669d7b3d7aeaa477200869ca3ecb25b8be6a7e5d9
SHA512c39855f84ac7745e880198ba179cafb9c8264454a2bd1ce1f3dbe9416ae03eefaad93cce75a144ff3cd0fc0a4eb77180026f43945b8e2bb6068f2afa49934961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e5f4f2474e33dbd3d280267d4f3754
SHA147031d465f1a2f1e6d76fa56ad041605aa5cdfd4
SHA2566d86ffc1577c8a5bcf396ff8c132c447612d55e93bbcf66cae1f435f90114693
SHA5121d7012faa941188af5846081afc8490b1e44bdf263167790a2ed7335326fe34a42d0e1ef05bcf2a1fb6cd3127993a9922fa8f8fedfdff77a991940e6c09659ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869238567a1df4f413385eadb2e60658
SHA10ca32bc9a3c91674a3c4dad88ad10696067ba808
SHA256d7aea525521b3bf7ed31f525127b863c692be8bb3bcb6c409542ed75dff9e14f
SHA512417150304267bd8bfe7769c4d2630b2720c3c7d4d90b8f39db9af8f440f4b81765e66192aa546fd4b5f183e6e0531dd459d17ce5b275bdcb313262778f3564ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a43872cf3cc02afdcc2f2c1e45e204a
SHA19a934f133609aa4158865cb74af5b410f5eb5b3e
SHA256d709a41e03bf2be8828d54713c57df9039c8abd53e6833ef288a03987ae929f7
SHA512c3eb7b5375d5cced59a61b3176047ef48cf3b669f2f594abf8ea4d748ef40f3e41981c7b963a46f8f8de72ee660b9bbb286a968625afb6e624ce28685096c10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffe416d1403da358e1716cbd0eaf1df
SHA10efd2b827c783610406fde993979c5f724426a70
SHA256a5c412ec63a148ad7d9d97e965cd8702c7040576521b19d0c4f65be74add35ca
SHA512a4b95ffd57e73595047474d2a3532c597bef800dedffa85a1b523279411264c500e4b36fc35958a13634b206dc8cd2ede8205561c6c42068f1b3075f14c5aa02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58899f75b6b77ee7748916656bcd49d1a
SHA19c77637dbe8834b16abf67c2d325e87b9a7b4bb1
SHA2563e46924148f3a6719eb9023dce5e2a0c233abc7df6c197e00f3506efd16e7309
SHA512b0e399d8421c5b8dadad4e5ca450af31f6492db4f6f8092e630791ef3399f3d5d6bb4f6c5150bded90ea8565b03cd0efd9bd69b230e9e5196b71b7c2bd261dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c9607c1b467d70493fb929176275e8
SHA16fd731efef7bae729a2312f28797d893c56f0c71
SHA2563fe2a1d7db9f384b95fd6a4904f28fa5c10edbe4d67fd0377f181b4d3ac64135
SHA51283c5f0a2a37ac9f4608b259a09df8bc9ee13381d4b96ccfbc5a209f94e93d2ebb46a8515c581604a6fb6b19cfe59357a31495580afdd86ad2456df7c3f20d660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edb78db0288258ac2cb5a25912f2c89
SHA16694f00f0817454c72772cbac84caf7baf8ce921
SHA2567c72d6d77395b425e7cf251e280c753d37a06722ea8fcc371caa0f0383c08097
SHA5121bbd414a796cb2b5841d379387cb41c56dfe060c375fcc357c99d93ff2303857f8eae3c18b23608b193d9857fd66f404c82a0451cd2122afaf85e9c2caf702f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f065c708498673ac7a74d1b610d05a2b
SHA1cd4c40e195dbf2f5b4337ecf800b3443591299f1
SHA25623cb390fdac26f7f228d47e9c96d6d8e45b837cb05fcca6574c318024ce486c6
SHA51230cc9c9ad2279f607004b08a161680fb6a2b179522a8aa42d10324f7c8b87367797ae790362d40f569fd7fe184f84a573d44edf917025cbc9cb80167d1f256e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3633ab632debb08c6ea7ff6b451cfe
SHA1720322f7e3e9490c14194931b26e3f8861d11a06
SHA2562ba89d046d4f1145903db2901a14493ad8cff285bcecc1abcd8f4a0fc9ffd400
SHA512fb9cedde263b15828328e4b742736aa7a8b1fa22e1bf5bb826274399d561d2a6e4b56b09b1767d325d4f3c983bba638cf88e28966ecf727af2b077c0da6b1558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53871b169b1d2d170185ee5cf000b4372
SHA183bc9aa35d4461b864364975ba8630ba8964e938
SHA2562f48cca0069ed000547c7904d6a6c557dee3a9f2fb2d7bb18037ade77b94fe79
SHA51255949db0f9b51047bf17024397342549dc8af17c5a9d3acf3dcb2fa2efc0856f1b453898da17bc35dadd9bc6d21329f19d0601949bb4b799e0708afb22edc54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e4860257f6fa93b73571f88f84cf2e
SHA1c2c5cd9d3d6b9679a68b1b1e402a345c233f5189
SHA256785832d428264f4f8b4c3a6043a56610759f0c9e1e7c30b0b1d325b03a82ddd3
SHA51249d9be6a51ea0e78b99857dd965fd4ce3ba6037b3645e0f2a30a15c761501940e83d7ac57e201ced5d98eb2273118e3efb824327db19cb2df4eca8aae94f6872
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a