Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html
-
Size
150KB
-
MD5
79cbbec404005315c715de8da9c58ea7
-
SHA1
0b3cbeac116fbb74c11ba0c08737a831e2791fa3
-
SHA256
013261f23c718c26af3bf93269e06366f1a4d0bb37563094f35094485df635eb
-
SHA512
824adda1e323f266c7caa1273c94e5968fb57b8e9f60d059312c35887d530f52665b901cfa2c33e68d337c8d8c122e5675bc374e92ffe7c8dbb113d29b11b4c6
-
SSDEEP
1536:ifRTA877a1FgYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:ixGgYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 1456 svchost.exe 904 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2544 IEXPLORE.EXE 1456 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/1456-482-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/904-490-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/904-493-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/904-495-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxF25A.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422990371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE552821-1C48-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 904 DesktopLayer.exe 904 DesktopLayer.exe 904 DesktopLayer.exe 904 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2312 iexplore.exe 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2312 iexplore.exe 2312 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2312 iexplore.exe 2312 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2312 wrote to memory of 2544 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2544 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2544 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2544 2312 iexplore.exe IEXPLORE.EXE PID 2544 wrote to memory of 1456 2544 IEXPLORE.EXE svchost.exe PID 2544 wrote to memory of 1456 2544 IEXPLORE.EXE svchost.exe PID 2544 wrote to memory of 1456 2544 IEXPLORE.EXE svchost.exe PID 2544 wrote to memory of 1456 2544 IEXPLORE.EXE svchost.exe PID 1456 wrote to memory of 904 1456 svchost.exe DesktopLayer.exe PID 1456 wrote to memory of 904 1456 svchost.exe DesktopLayer.exe PID 1456 wrote to memory of 904 1456 svchost.exe DesktopLayer.exe PID 1456 wrote to memory of 904 1456 svchost.exe DesktopLayer.exe PID 904 wrote to memory of 2284 904 DesktopLayer.exe iexplore.exe PID 904 wrote to memory of 2284 904 DesktopLayer.exe iexplore.exe PID 904 wrote to memory of 2284 904 DesktopLayer.exe iexplore.exe PID 904 wrote to memory of 2284 904 DesktopLayer.exe iexplore.exe PID 2312 wrote to memory of 1648 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 1648 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 1648 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 1648 2312 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2284
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:603148 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbe62117faecffcb5ac8f20f58567a3
SHA1e1bf84f37806d8e2465a3d735ee173b81125136b
SHA2560f317f283ac10ae1b32218a4c355f4ba6821bcd50da1bb7a9eed6e3612fa5c2c
SHA512e753cdf6df15b3d3e6af29f13b14afc654c7658b38e72aae2e04e341a22101999e4fcb9175e83b685bd8980812f8229b74588daab2582a88768b7d324bae30b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a233dcb6287d9373dbda96da0b0f21d9
SHA1c9ebc0833782c4f3ab1a5aca6fd50cbd2bd32783
SHA25638d75ced5d107edb51ebcbace42ef79b9b9124231bb70a6e2da286d341b97ad8
SHA5120311b270ff8b6caf26281b56f4179bfe9fcfb3fe0605134035ccf9eabfc6554e0169ea83aad2f8146efc26c0dda996ddc974b8da96c3f69f1b1a6636fc8a624a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a60b557f92cd418c96aa9bbe7b7c2b
SHA18381588801e8596af801b0e9e7f53c04729a26f6
SHA2566b0491895232f08432a0277c00f7e449d4458d20bdbc628bdc81db97f5de0715
SHA5126a78c0c38837ad5d7ec4eff331087f5cfc693215fd40db68f9fd6b4c497cb1e75d0004dab83cd41f4303b209920a31728016742c071f9acebdddf13ceadc2248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b1bf9e7486c4bb20788b7c689f4f31
SHA184696e16c39b4ce8c24d05546f43a52a6e29fb4f
SHA25648e5e7d1a89d098c5f0d6b12894267b3c606561b78a97d210f34519e62febb1e
SHA5124f28b94c8496655f28bdef78a862991162c5776f9dca023d68f9ebea0bf344a9505bb5f40fa7465587d1e86cd2d3bafd3d4f4e187450528621684dfb76dfb67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534bdaa6f89a979a45e2510ad6f3f83df
SHA112c2220a089eb2ef29280f9f26b21081de072057
SHA256a9b696d42a658e25e8fe058c18519c6d4a68d7a5daa976ff2dc6c4d2a30fbe56
SHA512c0dde4c4c26f07b3d3c48d106d0222ee45f379158dafdbaa6e4f708d2f0e997fb48301bf131f5d8c57fb445b1eb71f920b3141a2dce645a2d9e733efba5b87c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6cd5c6b955875ec5a1e82449589272
SHA1151c09fafa917d9de870702a1f164a6f68153aed
SHA2561357f6c3f5235255cc984d3fd3ee116583dfbc1c205fe3e54507f76eb99fc3cc
SHA5120d7c4e7e8c5587f9e6f74eef0a130fd393a77d6e1cd1a31cf4f73d146c49674be1068d6e413e4ee76f52abdb405b773c6fbf191e1dd95778fdc701671906c910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e5578a9eac3935c4a3111654483b6c
SHA1702f0dd8788c624d90fa513fe1b1ed0f17c81441
SHA256c5d5fe2347019130ef31ac29d9ab67aa345dd210eb3cf9c73570978a78ca3b2f
SHA512b82c534e72599e34ae26a060757ce19813c0623e2821ab8a73a2df055743834fe7144c3cae48cd8516fa00fd4dd56ae3e98b38ddeb5213410289a32e4621ee00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49d54da9d4862ae1da963a9f495623c
SHA18b324f6a0481a4321e2fc8bf16ef25df85e3f0ab
SHA256c86f6932045623ba6d5c70bb4b54f4adb21d5263bfb51305ff5b7d6689855f3d
SHA5122cd9c3f0458e02f1c42036852f1853cbeb1c190906cd412fdc6fdd4ebff0ed6ff39fcbe106ff5b7397ed64883a4118b04b4aaa78cff7ae190468cad5bd3ecae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd692dd28ffab787b030858d1d7f86f
SHA15fefdeade1b33ea413284fea098be420f6662f42
SHA2561fca441143cf1cfb5cfc0270bffcf5d522607a9df98617fb8a4a4cb8b62f349e
SHA5128c610a95fa78f418369eb197209f526a1984ccb59b449147f6256a55570a62d60b8b0ca856bc44318928bad89e0ccd09b065df6f2f3fa2207a0d28218516c7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56023841fd94244b6f5152ee6a7f197c3
SHA191502e9228a6477ad588e4c51cc81815d4d9cf03
SHA256e1c4013a014d4b88727690eb7ccacec99654150f1e30dffc2be595c035d24d69
SHA5125fb5816a1028e2f911b88d486faa915d0bb3d1bebf08586d55b8e891be100fb855113c1d72b4d68778220b91158f8a60dfe34f3b11d366281a0c1f55cf9b1b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54face282f64649919588fb22a8af2905
SHA130bcf599da6014b5cc389d9257baf34a27c9d7aa
SHA256e47fdc73933ab7043500523f2ec6e91af7c92444d07fbb0f0745c4ddd5498ad0
SHA5124127ddff0c7fb306b0389c241713ba4253e88b196921a34e39b9a38d3787b0316786199986ebf0fac2b880578e3971e31b4dd3fb2a2af806a69dffbd264b5ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dab07b034e03d7cafd5dea1ad54edfb
SHA11abeee80544ea5c2bccb1a6de54a647e74ca9303
SHA256a71472462139b0b8e840fdb1d988bb0e441c4dc96f4762c462a61a63cb19b49b
SHA512f8b73a2fa557ad2dc10a81720719aff48f58f9b9d6c56be58e42d56f72605d0f0247aa36926140d4bf0dc20309156a410d26947e372e23ef8256af45aa82bfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552daa9f667af694c7c332fad17bf11b5
SHA1bfd65482e809246e2e70660b237d85468a81ef92
SHA2561ed7056aaad97ba7f4de26322fd1df2a021dfac18d3dfdc948184f55a78ecf4c
SHA512988fdfe63eea465935af3578861cf35635857b5842f595271a376ec8db23d5a4080eb167eca75854ee342b8b10590d4f02d21093f0cf58c5bdac66e55d5b538e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7248227160c8d06e0718845a4dfe57
SHA17994c18065d335aa9f8748dca730986dc2852136
SHA25670ee98f6dd952dd98746094b0017414a61a19b160b01969bd56009f26a90fe5e
SHA512c65b0b468a83333d3fde6223c86c424fb0fe3301b13e5e7ffb46355d512b4b497963c6b71a2eba32b022bb38a10b1f82a1ec5b6726244e1a3d64ea7fa8bd9ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7cc8a511b9be07703000e9322cd7d85
SHA1d810a568c5e5fcb19f0a4ba3d7a96136b4549a41
SHA256c5824432ab1250f5389ef296f9c28f47ab2dd1cf40166f7f8ad90ad71603de7e
SHA512fd74d7ea3d0e591e32952e45dcd6c868fcf0d7f39f2b4940949593c9f341961d8365acfc20fadd48948e9e0d4ea44713c3895ef5e9d8416cad037d973679a6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc54248b12cb5614cf019f15029b9357
SHA12a4cfe3a9c2679f8dcd150953a7a4aca883be6c1
SHA25612364f37ed35d3792e143dd7a3c099e0afba147f27dc5a09085ccd4ebd5062a0
SHA512a6375ef76662e51d906ed493b4695f447b3e07ecf09fb78d9c49b09ea6a84d3e56f0f00917ae6c1f078987d7f1e3633a0096502da670f5101b0696a5591e5461
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a