Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe
-
Size
808KB
-
MD5
eaba9b91653a961baae8faaec6fc51b7
-
SHA1
ee93c0edcc488fc74f0ea4c64f09658bd4fe2190
-
SHA256
7d317b2c8a8f997bd3717eb0a94b7a4c1167af969811e28ed200e0d98452288e
-
SHA512
9088d9a0678aa5838ff7ef371a964fba0e6fe1bd03e502e9451a942760349454101b42e8829bc7ac1b5b4dd4fb554d3aeff9511c74afebf850ac90ced6ec55bb
-
SSDEEP
12288:kWiLl6xF2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Baoss:Q6xEGALzohzUy2NJvhjyR4kKJRi0+hs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000800000001752f-27.dat acprotect behavioral1/files/0x0006000000018690-45.dat acprotect behavioral1/files/0x000a000000018678-43.dat acprotect -
Executes dropped EXE 3 IoCs
pid Process 3020 1.exe 2964 2.exe 2852 PrstService.exe -
Loads dropped DLL 9 IoCs
pid Process 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 2964 2.exe 2964 2.exe 2964 2.exe 2852 PrstService.exe 2852 PrstService.exe -
resource yara_rule behavioral1/memory/2964-30-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x000800000001752f-27.dat upx behavioral1/memory/2852-49-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x0006000000018690-45.dat upx behavioral1/files/0x000a000000018678-43.dat upx behavioral1/memory/2852-52-0x00000000001B0000-0x00000000001D4000-memory.dmp upx behavioral1/memory/2964-68-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/2852-82-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe File created C:\Windows\SysWOW64\PrstService.exe 2.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe 2.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrstService.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{729985F1-764D-11EF-976E-62CAC36041A9} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887918" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3020 1.exe 2964 2.exe 2964 2.exe 2852 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3020 1.exe 2964 2.exe 2852 PrstService.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3020 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 30 PID 1684 wrote to memory of 3020 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 30 PID 1684 wrote to memory of 3020 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 30 PID 1684 wrote to memory of 3020 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2964 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 31 PID 1684 wrote to memory of 2964 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 31 PID 1684 wrote to memory of 2964 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 31 PID 1684 wrote to memory of 2964 1684 eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe 31 PID 2964 wrote to memory of 2852 2964 2.exe 32 PID 2964 wrote to memory of 2852 2964 2.exe 32 PID 2964 wrote to memory of 2852 2964 2.exe 32 PID 2964 wrote to memory of 2852 2964 2.exe 32 PID 2852 wrote to memory of 2936 2852 PrstService.exe 33 PID 2852 wrote to memory of 2936 2852 PrstService.exe 33 PID 2852 wrote to memory of 2936 2852 PrstService.exe 33 PID 2852 wrote to memory of 2936 2852 PrstService.exe 33 PID 2936 wrote to memory of 2720 2936 IEXPLORE.EXE 34 PID 2936 wrote to memory of 2720 2936 IEXPLORE.EXE 34 PID 2936 wrote to memory of 2720 2936 IEXPLORE.EXE 34 PID 2936 wrote to memory of 2720 2936 IEXPLORE.EXE 34 PID 2964 wrote to memory of 2188 2964 2.exe 35 PID 2964 wrote to memory of 2188 2964 2.exe 35 PID 2964 wrote to memory of 2188 2964 2.exe 35 PID 2964 wrote to memory of 2188 2964 2.exe 35 PID 2852 wrote to memory of 2936 2852 PrstService.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaba9b91653a961baae8faaec6fc51b7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\\1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\\2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat3⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be10f990337df98a2b184ca1247788a
SHA12eab769c6d8fceace0eab6627822c8f1a4061dcb
SHA25685c6d396071f77121f8d16adba6133104d86bfa95f6d7ae6702137dc6a81fdeb
SHA51205511750b09fc0df306aff4ae4248691576bd3d1e76b4abb2dd05117e339000985957e9e614aaa50e2b21b856e5e47a031dd44ada24f83f0ecd063aa8252b1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab6a49aaabd19cf7349406f0e861d07
SHA19e3d6bdb474fbf48554df135a00283ada425b09c
SHA256ba93527162feb099bdfbdb491fe49bf0ee0a43e3f39cd1f3646d5689e24cd9b0
SHA512d5e94313ad3ec104853439db813916336836ad5480e66018766be9496e9856fe5a64f3bca03425314c3ed3f336b33ebaa6d19b91c2f89595b22da3f0a62c661e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a9664bc0191ece71800f6f52c7949c
SHA126f233b40f9ec6094df03e28078ff55397e4f6ea
SHA256771a8526dbb070a9945c7a4a9620b137dd4467fd2b4be1f501a4fe3e0a18c304
SHA5123b7ac0f5e4247498c2bfcc183912048a3e711e14277f996a23f24311350bebfcb36171935aba57269fa4bb88ddba28095105a904dd90cdbb96351105e2047ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599966518d91321c3619846100c66fee2
SHA17d47b993181bb9e8f6f0d54f4df853c0dbf1bba5
SHA256859e49497473073c6ce2ad1148c7313fce117622a1330412a7a16c01ca18366f
SHA512a072edb5602bb50356d13099374562f8779018bc95d1a57e3fdc53756e2487ff83e3d59048c57e650a302c88083591f8ca1774359462ef5bb06f874b96164fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ffba54ebfb2b6dce441d2499655a69
SHA106d48a806e77d392286f1a7347d43ed70d3a8cd7
SHA2564282ca40aab0637480110ea9838d7e4414728c98a2065c2046d1e06d94e64031
SHA512b34465c21bd77fd55a49a2d6a5832d21def9b6b9af3305b53774a4f145fff0bb06c69b5cf6e18b1a0d76d01f872c7767d06e2ec2f4303632f24f8cbf6ea69c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554146efa0482a46e4dc4ef31d4a18554
SHA1253d7305e89d9665e1941697ff35cda748bafe79
SHA2565b11bdfacb12e9e5cb7148b978e7551eed1c0d87e12418c2ab4960330834a5a7
SHA512cf9de1bb166c71babca4f99832778feea80ac26af01b1a6a69a11b2c2f27b3a94a82ca16001df47498736b815e7770b8fd63e16c209bf647de45bc5ab93f0bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa18329d5e73fe8b65116aa860a0813
SHA1c0f9956143c93e0e02420cabdeb71ee6c50f9814
SHA2563b8f1eafa9ffb1827d309064028362259418d34ee1765c4f7bb56cfd57ba8b98
SHA51240f786995d3c52e80e1b3ab4575b8698ec746a51ca4792c90751c72e2bdf1e377831c990f7287579bc7240f6ed8210f9f512ddd16c1d64d394981f6db77fadc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e50adc1348ad9792a109089ee7fbaf
SHA16ce3a6ac0287470a6d56c17edf082a5f5ea01660
SHA25644de52ee7b902b28b29aba458a11081696ecd0bca89f5966ad8cf1e49e953ed2
SHA5126238ffe4ca888ed05be7ce623edfdb2ee9f739711f5a8f87474625e3e9e04a1b89deed9f3811644ba8a007e8a8c572398de8cdfeb7032579e0a2f48ea7bca917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae64ab20a656b620887ec93af689c305
SHA17b8f944cff868290c94e51275974acde2d20533a
SHA256a0bbd0992bf84c85d6247203fccc0ccb387fd4e93e4f8e7e9d35070db2ed4985
SHA512b18d9dc0498e1190cbb8ea6a98df8fa54b322dbc5ba8c70c91cd6c9fd657139bb68e996682fbf440452c502e957ff47c755e279f8057dfea7b584175f87fd02f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
808KB
MD5eaba9b91653a961baae8faaec6fc51b7
SHA1ee93c0edcc488fc74f0ea4c64f09658bd4fe2190
SHA2567d317b2c8a8f997bd3717eb0a94b7a4c1167af969811e28ed200e0d98452288e
SHA5129088d9a0678aa5838ff7ef371a964fba0e6fe1bd03e502e9451a942760349454101b42e8829bc7ac1b5b4dd4fb554d3aeff9511c74afebf850ac90ced6ec55bb
-
Filesize
140B
MD53999b1d9f71d8afaf8a11006ef244df2
SHA19d1a1fb1c1c4f252e87423bd19c416c325dd5730
SHA256bba39bd9b7d92a52bb3af39a33cd8f64cd2c8609945812a63064287ccd7f6632
SHA51273e0dcaaf09922c4b8600930256638ae076f009157326efdd09e666162c357999d37a363621cf433921596a3927b5823f0affcb55db4e2fdbf4a9fbac31391dc
-
Filesize
40KB
MD592064dcae58df7e3a142489be0692470
SHA1637d7dc85d7851f7560c2aca867370840da43d6b
SHA25663c20d5a6d2eee79e63dc491e92a54a462dc00c006070b2bb7b3b5e23fb151a9
SHA51206649b6a1888f5ec832b1b8c60b88df446483ed6c1d9fc1bffa133fbf648734a5a3467a4def0465ca1cc944b35f25c516fa8d25afd7e90eefdab7499cd5749ff
-
Filesize
747KB
MD5ddff616a1a13cbc248d65ae45b170e59
SHA1ba65bb128efb309e011d154ff2b9b55c684e369c
SHA2567c40180d4d55b6598cdaa8364a926b10e941e16c423fbe017f313858d48dbc09
SHA5122e9ada00207fb5e32b035ad1bacc03828dbfebcce768d98323639cf40a52920c9a85b2a79eaa13bf4e74b32584421c3aaa23e7c9e6e85509c99ed5821a358a42
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a