Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html
-
Size
157KB
-
MD5
4b8378ba0b75c6676b80288f26e6881e
-
SHA1
228ca409b26c40d613e27ac68b39921542ee5cff
-
SHA256
1759462569213bab2a543cb7aad75b9d2da41544d3160ac1b428fe572c4d6762
-
SHA512
72f3b8df10322831877e35836f08b6864c242dfa0e2adbaa6316cba4b267d0a59d9e81778214be289bbb3563145152651c03dcac277d93c6f135a5058c2ceeb2
-
SSDEEP
1536:iQRT3esx9buyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:i6Z1uyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1044 svchost.exe 1824 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 IEXPLORE.EXE 1044 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000004ed7-430.dat upx behavioral1/memory/1044-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1044-438-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1824-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFA08.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422031099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73A64BC1-138F-11EF-B3A2-4205ACB4EED4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1824 DesktopLayer.exe 1824 DesktopLayer.exe 1824 DesktopLayer.exe 1824 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2576 iexplore.exe 2576 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2576 iexplore.exe 2576 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2576 iexplore.exe 2576 iexplore.exe 656 IEXPLORE.EXE 656 IEXPLORE.EXE 656 IEXPLORE.EXE 656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2444 2576 iexplore.exe 28 PID 2576 wrote to memory of 2444 2576 iexplore.exe 28 PID 2576 wrote to memory of 2444 2576 iexplore.exe 28 PID 2576 wrote to memory of 2444 2576 iexplore.exe 28 PID 2444 wrote to memory of 1044 2444 IEXPLORE.EXE 34 PID 2444 wrote to memory of 1044 2444 IEXPLORE.EXE 34 PID 2444 wrote to memory of 1044 2444 IEXPLORE.EXE 34 PID 2444 wrote to memory of 1044 2444 IEXPLORE.EXE 34 PID 1044 wrote to memory of 1824 1044 svchost.exe 35 PID 1044 wrote to memory of 1824 1044 svchost.exe 35 PID 1044 wrote to memory of 1824 1044 svchost.exe 35 PID 1044 wrote to memory of 1824 1044 svchost.exe 35 PID 1824 wrote to memory of 1080 1824 DesktopLayer.exe 36 PID 1824 wrote to memory of 1080 1824 DesktopLayer.exe 36 PID 1824 wrote to memory of 1080 1824 DesktopLayer.exe 36 PID 1824 wrote to memory of 1080 1824 DesktopLayer.exe 36 PID 2576 wrote to memory of 656 2576 iexplore.exe 37 PID 2576 wrote to memory of 656 2576 iexplore.exe 37 PID 2576 wrote to memory of 656 2576 iexplore.exe 37 PID 2576 wrote to memory of 656 2576 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1080
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:406539 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5982dc73fe56fb95dc1b66f89c3d8cda2
SHA1ad9f183ce78471d46f12af44e870590e1b7cf669
SHA2561088f1a5003244b5e420dce87b06bafa19bd2f70dbc7fa3210d731f9c08a68d8
SHA5128564ca646b5fa22904701961cebd54f60d59245bf26cbd834e967cc157ed3f36fb774a5c7587739533f2fa49e8a16463b10cfad174f4497c4c2b2069c5efc8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f085538ddd7221f4c284032d71ad51
SHA1d4daf514929eb989b2c7e7e8705f818fa9e6ba20
SHA25684f75a589c0b7c42f33854ad26e550f4c9cc67f9056da831a21d12b11e2bd2eb
SHA512c12922e6be4041486a42962f2ec5bd03dcf9927a61c4e69e47b2e2c2aa5dbdea81a1c85d519e4a6ce1e1704386d624d79f0d2044a75e3973d4ebfccd66c70033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fb51a984c6a0147cfef53bc86ce6f8
SHA13c607c19202e192a409c638ab605cc3fd7730a1a
SHA256fc40b7f7fb761a5523780f121e055dbd3e6cf1c316c2bee86f92fc3773b27a4c
SHA512fd20f7f23a73e463a63233a9d059d48ed62b1a393caa339c54fbe5eb4b1937927d04e5afb3df507be9cb2a872db8402b8f5e2e1879b1bb4983357295a76097fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a8b89c2e42f942464eeba3a19b1919e
SHA194acde6b62d9eb0b0d91a3e6e45791ca1d0adb82
SHA256ae4631f5c0655f0723ccd108455842bb8e1e00520082ebf9347b3f079806c5b3
SHA5123ec5b120b16f3dc26c34a54ca52d0cc7553fe5cae8fdd847edef38672fc31ea8d3480da40acafb5ce7c0505dcef3b0c418d919a48d4c13ad05fae5a19c7bc523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30f787915226d42753ffd2855d16932
SHA1cc01d3bb4dfac85ad88bf1be2c462cfced27cd72
SHA256d8610a24393ec7760241708f8aa54ca755c56dfedf3cdb7840179a29ade285da
SHA512356dda05abcb2f2d8e6504d8dc334bf79d11803a1a903dfb27378174b71755daf6325c8e238f43d26f4835d5006eb88c1ccb2772ae5ecf287896c491b965ca36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c6359890e085ab3eb86a58a68fd8d5
SHA18215d8548b8ba627b401c508f00cea02ca016339
SHA256b09d491e540255855139175f1976ccf63af9653705d433f96cb5927e7daf2cb8
SHA512dd733ca9ff6bb52fc5605431d297f4b9840101dd0935819e628fd37aac86ca248a8f78eb114fab20d830ac19104efa6d8a96f3c6d1b76f1e3f2f45a023c77fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af346d8dd401cf3d365c3073be643a0
SHA1a64cea47178caf1ff944510905f27c1e042b8a90
SHA256afddc08991629b21c9e6c3b01e66a250d144166a630b24971c9d015452f533db
SHA5123580104c4f14d3d90ebd5a3b79e54927169bf73afbe4291172506a2d11d3f64be758e2c860a131806c12db9bb5fdc08b725997f66c142f0619396e6ad63c6ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae1bcdfadd3f37edc39f6eb367b49d61
SHA16a0775bda7ce24df7bcbeb7a772e81ef506b5d99
SHA2569d5a014794b619eaa07239f099c9ce41d05be7ff8e90a04092edeb9b5d4e5d1b
SHA512179f3e8cf9cdb117d620ffd66b0afb42f04f3fa2b6b2119f7ee380774890eedc60046fdeae47601548ea876c46bf56d5fbdc1e36117c82154903f0081c688ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0c6435ca5198fdb14b9cbec5defb7b
SHA18028314907a10c92de12c0217d06376e0bb15927
SHA25606966ae80e436f0ea13648d07fc2607aef575d95fbe35559bb2609be8ad5adff
SHA512db9d3061f65246f3ec4f1494cf3f6dae3d88061151642da1fefa7ca67da572de328d25668f59b77c06b92e87214a4d1ab9f88b613c46eff4d71bed32582976a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5367aef2cbb18e16f8443227899986a
SHA1dea21d9212473d06ae9a8b465c4e29e9b65dcd7d
SHA2567b9757dfc9b6c8049c717a9b8b539ed154bf0edfe4814ad22652fc81acea2108
SHA51229441ad3718ae97963563fd1a504fb1a4d34dcc4b3d57dff77c2e8ff0a1bfd31e9224b2b6f6576c514d232cef690c313a8d68331caafaac0b350aadeee5eca12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f63a27cf0e0f2f1094fabedb0da49123
SHA166104f2245691f3681b0651a663549c42d3beb44
SHA25603a0b3621225aaf5a4aa4bce254ff5ef55fca4d0de5c352b515316b24d5daa9b
SHA5120af11507ab7a4172ab8b76366f91add6a67d1bb351bb1700ddc9ab26fe9d51a4aec8c4f534f8b3befe5c05e5b8020c59a58b046c43e98f385170a497ed876560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e60be299e2348e3abeb9fff53113930
SHA11e4d47a2720b51e262be009a36873032ac9cecb3
SHA2563caf37c835f80a57fca6e82f8c87fbf95a36746baf5142e5b2d1bc97aee33e77
SHA512148061a1ceac56932b641a8eab45d8e59e59b8488d17537f4aa7734e2837e395b43b048f997155d590afc6c8f85147480a53843618e7347966c889d502ef4577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c24bbbf82db70ed9e27a20603c7317f
SHA161a6d37bd8ad1206d04d0c9a85adeacaad45c956
SHA256b09e6ad4f4e7bf83272e6e0d03016d15f590c1125b4a6c1c8580e9a22a24d6ef
SHA512696c005e3351f85d0d9ae2148c771ec394492160b3fdf6b646a6b896bfca44523ec43884c37b29e30fb7119ee36b00ecfb92900bb5640a3c7b1bf2e2e2895856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81bc7d805473b40883e303965d5c042
SHA146f36345965000e3f6646722dce21a786285f587
SHA25609a6220ecbbf79a6dd3a610f79db885665225dbc3ba1696d060a50e9b108c40d
SHA512c837575f6dead463bda0e8532dde8528edaed1554a30c4ca89600113cf8af44a2afddb97f0ae1aa839a4252767c0cc7560541b3ad082e38a156443795c9e2168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561476e3653d59ab141bc1595cbd29063
SHA1bbca9de1a0ea37390386e148793e11a961c459a5
SHA2563cb8cd6d644640b7c81ecb7b66472583ca99d526ea5aaafcf9eb1e549b5bec11
SHA512ae9de994ad1d7b66dba1d2fdd362849ef2e84bb3750428fdbdba41b6fb888a4f44b4931f7d22b4d139f92bd1828afa494ce7fcf1e4dd2c51ad39038f3a945819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f706ba9a90c5d120a4eead5f83231bae
SHA1c844feebc46a895016a9400fba760a5e06dca51f
SHA2566aa8feb3034b3ef9d83a94b07b3c87386290ea1fa93526446b4f393ee325ec74
SHA512c790b01301898cdc26dd718d05e3be2e83792a8da4b5d535f4ec4b30f0d7a7a3263897a9b964845700caa0c87905decafe5450752ddee273a9d2f090709e3020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e1251a9020b3e7a323b40950469b4d8
SHA1d96789214f64200c8e858d0321efc96a0d4e4243
SHA25663a99f8da325011bd68b1f31f7ed4f41b738e19e5137a8a57fe48280e1d0d979
SHA512db4639e575baea7e8874b87a3c6a9c373de9e89e4cf22b52b3aa1aadc7da45beccae0b10a0fcd56d10ed0537dd7b7c1aa89a3fb952ee7afb68a454c3a2fd7be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc5035714f6263bc405ec9a93aed1a0c
SHA1fd733d0be388e54677ebb6cc4936520aa7bbb3e2
SHA25627c874f550407e264ff6ec5b8b55eaadd892afba2d762ab782c7d963d6c89e19
SHA51289d45105f74087fac69a7127ef1b80491a432f24cd5c640e1de3d7bba4431d1e9b615b91a1c35db08b23079e2a86fb741041dfb61863410daa5ee3b9c837c8fc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a