Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
17552d751b747edcff0045d446155075_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17552d751b747edcff0045d446155075_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
17552d751b747edcff0045d446155075_JaffaCakes118.exe
-
Size
747KB
-
MD5
17552d751b747edcff0045d446155075
-
SHA1
72b364adaaf9ccffed73bc6ed94568870a067307
-
SHA256
46fc88511f8b4b179649c1a9b3d0d3a898b831b1021b91a0acc62f4015727154
-
SHA512
10bafbd257d4639749f50b8700be0b46ea3dc37a517c18ba26764a8b7554726b9bc632c9d871a98b57167d71e9fef160ebd4b86d3348d5e6bc04f889f55c7cf4
-
SSDEEP
12288:SbF2GlKL2ioCvMzUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:SbEGALzoNzUy2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015616-4.dat acprotect behavioral1/files/0x0007000000015c6b-20.dat acprotect behavioral1/files/0x0008000000015c52-18.dat acprotect -
Deletes itself 1 IoCs
pid Process 2472 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1268 PrstService.exe -
Loads dropped DLL 5 IoCs
pid Process 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 1268 PrstService.exe 1268 PrstService.exe -
resource yara_rule behavioral1/files/0x0009000000015616-4.dat upx behavioral1/memory/1988-6-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1988-24-0x0000000001DC0000-0x0000000001E02000-memory.dmp upx behavioral1/files/0x0007000000015c6b-20.dat upx behavioral1/files/0x0008000000015c52-18.dat upx behavioral1/memory/1268-26-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1268-31-0x0000000001DF0000-0x0000000001E14000-memory.dmp upx behavioral1/memory/1988-40-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1268-54-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe File created C:\Windows\SysWOW64\PrstService.exe 17552d751b747edcff0045d446155075_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe 17552d751b747edcff0045d446155075_JaffaCakes118.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425680215" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5EC39D1-34BF-11EF-B69B-6AA5205CD920} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 1268 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 1268 PrstService.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1268 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 28 PID 1988 wrote to memory of 1268 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 28 PID 1988 wrote to memory of 1268 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 28 PID 1988 wrote to memory of 1268 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 28 PID 1268 wrote to memory of 2528 1268 PrstService.exe 29 PID 1268 wrote to memory of 2528 1268 PrstService.exe 29 PID 1268 wrote to memory of 2528 1268 PrstService.exe 29 PID 1268 wrote to memory of 2528 1268 PrstService.exe 29 PID 2528 wrote to memory of 2660 2528 IEXPLORE.EXE 30 PID 2528 wrote to memory of 2660 2528 IEXPLORE.EXE 30 PID 2528 wrote to memory of 2660 2528 IEXPLORE.EXE 30 PID 2528 wrote to memory of 2660 2528 IEXPLORE.EXE 30 PID 1988 wrote to memory of 2472 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2472 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2472 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2472 1988 17552d751b747edcff0045d446155075_JaffaCakes118.exe 31 PID 1268 wrote to memory of 2528 1268 PrstService.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17552d751b747edcff0045d446155075_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17552d751b747edcff0045d446155075_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat2⤵
- Deletes itself
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55afb27cefae6e9267d342ac049bfc212
SHA1519f14819d4b8b5be666585d00c28a348bafc632
SHA256c7a0ab240a921dacfdc588b107572778137b2139c16275a0e8e8ec0c8f507137
SHA5121a079508fa19b018aa0fe44d05c493ebfaf87b45f5814ca7c83a321acb961e0e6a3bf036465446791ca4d74bdb400794f05a1b259d43c04ad3f220fb7e231336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526111e8910bef14a108b0743ce31f90e
SHA1ae07ef6e68f9e2ca1aba4ea2d68c9cd1a2995426
SHA2562b9f2e54e0f9b74cb1e83623647fc9e80c85a13972c25a9c28930324f99e76b0
SHA51291b9eb47f0738b1da562d97b00bc282cf62f85e6da33c3efcde5122c3e26278d56c5e903440ca253ca911e2fdf241ffb205c013b8035c2db8f0cb8985ad4727a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30310d3136e936f9da4f25b6d095793
SHA1671f0d478d750abfc4c7fc818c3c77d4d5c6bbeb
SHA256d6fa0eeebc53507e126a37cedb169e82a2a9798ff9a6091f1aa1e4d892ea1e94
SHA51206ac47813a47e00a64d3175811896293fb1942d273e1b228f6ee6c5ccd2e7a4e6fc37ea69f6a6f59816385451b9c08b4d54d99cdb9003ba5f959837fdf0c5d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a554720d196b50ba01fc50cd0427c9c7
SHA12cbe8ce89f0c0c2eb5057d3b1016a36224268f46
SHA2566ea5525d993dcb3ce2cbded9a69bc0f3f33df6b3160fd5b52e848e3e2e3e17ce
SHA51276708a82d3256207e2230d1f568a14703a25737672101db96c079b31d002eff767182046ea0c35a31ca7735824997803f8acb57aa8e6a651ee9b9e1ce557d1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd8eaed5443a88841922136f4f9ff98
SHA10d42c1c22e31b0418047dc16e1508e4aebe6b7df
SHA2567d1bf816b7352e506512f0f3f4942242d1153492f099b40d9d8376f8692895b2
SHA512b4d39ea200c93ce232fee876f8178239779d66c84a2ae64967feb794dd24894d12b66ca8de5608d2bb0a9eb2021f4ed6e23df6c053c0d67c80fa5b7140cbd550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44071b1bb7ce14d71a64d24ff93e75e
SHA162c583bde76b41b5dd69e076a139ca176486bba8
SHA256fdbc4acd6b5f334955d2b1ebbc52bd8eed200de2a5717afcd9aeb18adb854a0f
SHA512b52cb8f5170068237f0e9f326aac77be6c57225d7a314ef5f7d41203075a64f957084d9d35f8d02e102dcadbfdff036d594333dc57ea68a9a03be9313492e87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e48f7e0f4783d29e567883b345ccdb
SHA1ac3d65ea6e879ec32d8544dbefb79e2aa3bbc7ac
SHA256f7a75740a450454e8fd19e13a67b332514d1ef84fc80143a0aa9237a78cce250
SHA512c5924086a1bba99de2f429fab7831a21411ae09540c514e2153fcfd8791364c0bc3f402912ad07abb6588f67f1d770f18d358160dac43d8d9aab7e3327b06de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0138e875ff6dfa098be21c3c04ef25
SHA121a0e7b8b94b5cb4541bc4af6c643806cb1615d6
SHA256070176c0f441825782ea7e95feb29e29b43b254fa62e26469be2115858b18131
SHA512a093b7afbe4c5a150c8d17352799cb315fe7e6d8c9b5aad5ef625cb4262e17b017c06cb48a2fe72d6459994163c026f71ecb37151517d1635dd79cd37fceffb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac35a295a6917769390df78707a5deca
SHA1ad856a4bb6d355f689e66c2e408a2df91ed6e48b
SHA2564d487faf14548d4e325846aced2e763a5e1c5dd85597e5313120a80763398566
SHA51294c6a52ece982606096bfceca6a0a5703e4cc7e7ecc33f0bd99407be311189fb7efbe483f8ee1fc3bfe4e55364c29f142fda96d6b4367f6414050c6e0d054807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2df8d6901941984f72dad14b8546318
SHA16fcc0702dc6146a9794b0309c029f78d2e0ad46d
SHA256df56b2c1cf263a0cc47d45c812a75de3aca6bb9c5a685b609c5c36ec18c9b073
SHA512386e54a2357a52adaa1844013311e7155bcf75e50792dfd086b7272cb51e83c8273016edcdb13774db1b4dad5bbd150154987ae51bdfaa302e011043d1ba5d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a91d42b57722480f0f904d0ec0c0101
SHA1444aec956b0a1069b539c9dddbde9c3627e30556
SHA256e3d9c5411556fe75e916c8fc38c3fb22af5b2157aa1a9619c8d21870dae7f73c
SHA512d3a782721d06f03632ea4fbfbaf29740502ab0636001878a5ed20e74077924bed48fcab21650e504ce0e84c0bc95e51d3ae0105b6b971bf0b17a690498a382c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56139ec74870f3497cb1118ba34a050d0
SHA1562d5507eb251d49d9c9a22fd2faa4537cf7dee7
SHA256aa3775638256c9ab181859ca5b64b93b0bf81f5385620181ea75eea161a5cbb6
SHA51296396b2d4effc535e1665de61c54294650b3e854fbd03a25c4cc7410ce9c10cb17f07c3ed5ee1c51f7163fa85394ed9bc88146574e1e34af9c27048a05bb6748
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD5b583a6f8707fbd2651a580640a8ffd97
SHA1bf0b99737a91e3a62bdf4b454caa20bf620de46f
SHA25670356a7f09aa558c74929569ea09c8954bed3a95a96908b1aac1676441d9b52f
SHA5121a535a6e3aa8a3480b78003167a2aa8f1bfbcc35706bee39d0cc34e41042e16542c9c610a1ac43fdabdce20c27cfe8744bf94ab89347a755fe9460186749b682
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
747KB
MD517552d751b747edcff0045d446155075
SHA172b364adaaf9ccffed73bc6ed94568870a067307
SHA25646fc88511f8b4b179649c1a9b3d0d3a898b831b1021b91a0acc62f4015727154
SHA51210bafbd257d4639749f50b8700be0b46ea3dc37a517c18ba26764a8b7554726b9bc632c9d871a98b57167d71e9fef160ebd4b86d3348d5e6bc04f889f55c7cf4