Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
ffeb9fae5b944a265b0393bf7469e3fa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ffeb9fae5b944a265b0393bf7469e3fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffeb9fae5b944a265b0393bf7469e3fa_JaffaCakes118.html
-
Size
129KB
-
MD5
ffeb9fae5b944a265b0393bf7469e3fa
-
SHA1
cf9d8c328b68d524744d1db92f802b478c3a653f
-
SHA256
b7f47110c2c124cdd7b3914e5e829b16fef5cea06f25589490027af509b8e24d
-
SHA512
d78c41f8cc767d931588735a666a1e5292aaddf778d2af7ffc5e262653dad039378a7a05863b2b584dc315918915ae27fc9ee521ebbecca170638cd6f5d1e5d8
-
SSDEEP
1536:SGESFhe6i/wIlIsx2Am8mgplZk9QSoyLi+rffMxqNisaQx4V5roEIfGJZN8qbV7e:SxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2756 svchost.exe 1612 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 IEXPLORE.EXE 2756 svchost.exe -
resource yara_rule behavioral1/memory/2756-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x0009000000016cd7-5.dat upx behavioral1/memory/2756-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2756-8-0x00000000002B0000-0x00000000002BF000-memory.dmp upx behavioral1/memory/1612-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1612-18-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px9A0E.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1DA7991-7EE0-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9037ed8bed12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433830767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a5ec314dc5d7573ff57650d96ba6fafb924d102f4f6d8914d1357f4e654c0f83000000000e8000000002000020000000deaabe2912d208fea008d6950a996bd3237e40e8b1709b8d84b7a915544e79be200000004afb05dc8e9b5bbd7a540b497e867ebebd20c61325593208bf993e71afb4538b400000009d183c50b4595b9019fd1670c55d7225b72b1c44260a8a3d6339b9bbe796bf7540ea0149d74438732aff6724b0f0016bdbe2544c3509b12b9668a2c183dcd307 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 DesktopLayer.exe 1612 DesktopLayer.exe 1612 DesktopLayer.exe 1612 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2184 iexplore.exe 2184 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2552 2184 iexplore.exe 30 PID 2184 wrote to memory of 2552 2184 iexplore.exe 30 PID 2184 wrote to memory of 2552 2184 iexplore.exe 30 PID 2184 wrote to memory of 2552 2184 iexplore.exe 30 PID 2552 wrote to memory of 2756 2552 IEXPLORE.EXE 32 PID 2552 wrote to memory of 2756 2552 IEXPLORE.EXE 32 PID 2552 wrote to memory of 2756 2552 IEXPLORE.EXE 32 PID 2552 wrote to memory of 2756 2552 IEXPLORE.EXE 32 PID 2756 wrote to memory of 1612 2756 svchost.exe 33 PID 2756 wrote to memory of 1612 2756 svchost.exe 33 PID 2756 wrote to memory of 1612 2756 svchost.exe 33 PID 2756 wrote to memory of 1612 2756 svchost.exe 33 PID 1612 wrote to memory of 2176 1612 DesktopLayer.exe 34 PID 1612 wrote to memory of 2176 1612 DesktopLayer.exe 34 PID 1612 wrote to memory of 2176 1612 DesktopLayer.exe 34 PID 1612 wrote to memory of 2176 1612 DesktopLayer.exe 34 PID 2184 wrote to memory of 2728 2184 iexplore.exe 35 PID 2184 wrote to memory of 2728 2184 iexplore.exe 35 PID 2184 wrote to memory of 2728 2184 iexplore.exe 35 PID 2184 wrote to memory of 2728 2184 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffeb9fae5b944a265b0393bf7469e3fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2176
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275465 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ff3786f12945163264054c9b1c652f90
SHA1423ef18a07e356ed6609ef03247039147a129e2a
SHA256e9f0be1a4744c06c11e0fc178abed7fecafb6abd2cdc9782a90c8acea56fa5dc
SHA512f44f6a4d11adf340aabf3a883f3524a1538088abd74c8c6d4a60f4a01609b545907ab2b96c2422bdf718786ccfc2a1f9dc1c40ace29bef4c8acb5a233d760172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58684c554f6ee08511ba2bf0cffc1aef3
SHA10d27a7bf4035ce9033e8366214d31ee39582e805
SHA2569ef532c5143db761cde52c6c69d7af6f97d21ce4f1bf3835555d654f8ccb63e4
SHA512259cd5a860664399b21dddda30a4841be56c1e8fedb11b659209a78dc3879148cf9b79fe5e310f1dcd117a27082362bf37fe499f7298d20bf12d5c1421a50132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebacefb5bffad9c339af3eec4104f50
SHA1543e69d6aea9520577d936353485aa667cd1a58d
SHA256eb902afafb1a16a4ed37817a81f98f61403e995990bab4bf50f5bb77b9bd5f15
SHA512e232d922be29d17f9283bf7d2638059dc204f4980defa3a73f54b31a203346395c7ac5e54fc83af57915cb9c03d0b37141d59cb9decca6c7a6e2e5b6be273c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59920c49a699e7ff4eaaaecb118f292ba
SHA108f6a603aa7826a96cbe7033bd6cd858e2639e68
SHA256b72f28d2481f26c195a7917083d627ea5706ac0fa7b66dca1f0d765f3f1902a6
SHA5120e4d0144953d6c0532b0f1c7c01a646e238a3822373c2453eab6dd2c798f7caf97d4c0d309bc5de05ec1f1642c52febc42d636414923bd5b9acc1edceb293732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad984e6b7ce446c0d0c67693b3aa2f57
SHA1b1fded6c9e4ee17e0e60a2147f29c4d3cb4f4976
SHA256eb03b29cadffae1703dcd6ca70f044ff429561041d0739a6640b84ef6746b668
SHA512d24f217681a22c27f20905239cb3ca0e07678420f60feb5b1ac7b969030fb49d035c336530110696bb07762ba9d66216459062ec4f07b492e767ad82534b615d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e2231fee7b93718705f2e00423dc72
SHA115b7ab2eb5631253f4668f4822e18b5bde0e3c87
SHA256a0d892f64574f6a5c513d6b5e9eef7d6535994d94d38a8f096b309c519b231d8
SHA5120997f913847079e85bab4ddd2b461996d55567fe03e679ba5ee6fee347555dd66a7ca5da58c49afb6efa92a0c92d13a352afb9e46fb989e83e88b763f1431acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9fc84ec308ba11dd28a71e6e9b643a
SHA131a6ec901d3a3e630d1b214f527f45adaf36f17e
SHA2568f7b1cc9af96ea5b67a01c88cf7a43dd9527e4434241c392c85a886cbb1dd949
SHA512bf106f7bfb522247497bc97149839894446a8acf72a5447ba3558ef5a52c2a6dea30d5310df3e78ed554b551b441530639a8e07bc9d8b6fc049efd0a9f04e645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e366aafbefa96a152d6b036d0450207e
SHA182651716fbadeadf12f00e81a5e01a01e050e344
SHA25691a2bbfd3c10973996f1358a3f61dc393d6eff0edc571a827a81563ac378c182
SHA5124bb7654c4158a3f179eddadd11b62138fb340700616f72d522906937260752291ba464206d7404c9f7e1ea60f7e5660fb47e86463ada910ff3b31858cd2449a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb04e3f069be0fbe40bcf0e5e2c2bc7
SHA11c5a1fd37a3ed355fcb697555be5570501cfe512
SHA25687a5962bc869ee0f972b3f5b1961b45baf1486ab6990680bef880b8db2005dfa
SHA5124ac5e7df1d3f00a2414ce867df2390148593683727d0067f5ce5d79b50cb37215e37a3e9840c7c081a00f7d3bc0cb0bec35c9dc88e679697db508d686eb791a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81004b59a02b13df424295b607c81b8
SHA157bf4748be60a6acb7268cf8e1db9bc40bea4b09
SHA256299a60d4a16927457dc0303626f6a40ce776f7175c7804d5654e619b45da708b
SHA5128d775ebee296fb1de63a5a72a5407f1a7041f914528d5b8bc1d83aa24d108d93c7fd40138ca4129b02a823dc1770c9d177dfb28dde023bde0c656ea5090befb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0034e2560c5c825b589b66ec41227d7
SHA17037118dd8a474f645f3a2b0bf9fc62810d6fdd4
SHA256276f7f2341b093c6166a6ec598c73cb44bdd3d7e3996b6dec87fea2c4b6b3d45
SHA5129ff72d078d1d3db4691f1e56945dad88ca2b54494d8e0f24b9eee0229d92d045b7f1aaa42a940c5ce188ffeb38b47c4b10ded10baf376c28b9cb9ea5d973f72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dba0d41090e05dd3266813d066a60407
SHA1ee94e60d01629ffd4158ba94c6c7d735c5df54f5
SHA2567ffcf4b109958c2369e113351b3b41a891ae35045be003942faa85a853ad8683
SHA512388562c83898b037d84e993dfb92aa557628b0737bd678035e2ea902e0efc301d6588e3b0435590dac8dee89e91fd08a4ae5d8ff52c69967257d13cf4565936c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a