Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 03:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_465e75f5428e625a6c96e93d531fc170.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_465e75f5428e625a6c96e93d531fc170.dll
-
Size
128KB
-
MD5
465e75f5428e625a6c96e93d531fc170
-
SHA1
5cb5b19ad8d86577c24071cb474e9e4a16238c00
-
SHA256
ef63ee388dd98a6063a2ee13698034f6bd59f88a9d5d5cdb51305e3e1ab98599
-
SHA512
90bb69cc9f60a735e22a88179e87af3917cb9d503f4c809e6d3fad05949f75294f1ae7af5c4cee33f4997c4fc196a0ee14e96f90658386c6507ff66a78f59ec0
-
SSDEEP
1536:C6zZm3J9T8DMuxWtwN5+SVoZKfXYiiSD0vGu8nVnBU/OmtH3aPv:VmZV86oVoZKjtnVO/tKP
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1432 rundll32Srv.exe 1620 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 rundll32.exe 1432 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0007000000012117-2.dat upx behavioral1/memory/1432-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1432-14-0x0000000000270000-0x000000000029E000-memory.dmp upx behavioral1/memory/1620-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1620-21-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px8FD1.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB0D5921-C7F4-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441865834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1620 DesktopLayer.exe 1620 DesktopLayer.exe 1620 DesktopLayer.exe 1620 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1432 wrote to memory of 1620 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1620 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1620 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1620 1432 rundll32Srv.exe 32 PID 1620 wrote to memory of 2332 1620 DesktopLayer.exe 33 PID 1620 wrote to memory of 2332 1620 DesktopLayer.exe 33 PID 1620 wrote to memory of 2332 1620 DesktopLayer.exe 33 PID 1620 wrote to memory of 2332 1620 DesktopLayer.exe 33 PID 2332 wrote to memory of 2816 2332 iexplore.exe 34 PID 2332 wrote to memory of 2816 2332 iexplore.exe 34 PID 2332 wrote to memory of 2816 2332 iexplore.exe 34 PID 2332 wrote to memory of 2816 2332 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_465e75f5428e625a6c96e93d531fc170.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_465e75f5428e625a6c96e93d531fc170.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52171e478e11be354369e1ef0fa9f2cf3
SHA15ac9adc38e99f7f079ff22f73accb4acae7b105b
SHA2567a29dac0268400c05bed58a58672a2165090ae05c7b4b26e6d86da4577cb38f1
SHA51286c3a637dc4e4e120d92487066516c020009c242ebbc764601b613d78f6979c2685b8d8703e64094677fe99ed4811c2e58f03c62a0ff20760e10944a9e610bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867c1d233f2362c8bf5831e4d3e3e143
SHA19bf52a6b919cdb62cac68a135b9f7d2de468e5b6
SHA25628ccc3f73fe0c2831b36b499a925a3719de688b08cf04e4e859a736928247d47
SHA51296b1a13de8434fb6401848ccb5834978bcd2e9ca9034561dd7bba6b24261c6395a22de361f68696327f025f2d0ac3be6b4e398d814cdf5add411a8a4743a030b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c972c686517daa5f0a77364eef4f4583
SHA1dda7c981fd821ad16373b79d4990dee399c41d2e
SHA2568ecbe5e3106a38c1d183afa994e036c544f5689e8bcc1621a093dcc361ed2ad2
SHA512138bb9059b691f0bd6cc5b7eccce02fc0fd5b68740256f356036bc597b3f9c762cb94924142c669fbb12182819d7b1a16cc7e21ffffc73572f04de9f1434d776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7b269fc9ca00d654a83e220a6bd95c
SHA1bcdf11bb623156f858f04b765cfe5bc66f65b90a
SHA25610eda1600a7927d595872481d6bb4ac3a928a0e5f3edaaa58ebfed2cc2970715
SHA5122ba0c477d75288889bf8c3495b6b277474dc7baab2e43f813f22f608636589249cacc004efa656c4a3926a007f0d96b95a41c3700ebb4e8642ff9cd8cb1cc070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6feba652b4da547068329978966c191
SHA11b4633088fe0d2a9af59e5ee232dc716cea6faf0
SHA2565d4e8c51031206f3f5dda770336cae72bf3ef29fc47282c4b9d46cf4051cb052
SHA51280a9cfa00dd5c325c9d8922ecd6f7108cb5518b1449352f7103460196f20bef11a3f5358fa22816b4a433811e09f785940ad2711884f7680894ae2031b1e3e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57faa580fcdad44bb2c6e1b99a7e3a730
SHA1ba4b0be8b20f4d7b01ce25016fb9208373d6f96e
SHA256b09848aad40dbd368456d7e233e63a5d304845fa69e3ecc1d31a9945c068a55e
SHA5123a8bb8830cd992efa247811d22599c50b04d18713a375492412643f6553e8816f0cc0748c0c008d7e75c6a3969b4524268509a1e58b3dc9a9619ce5400aa011d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53101267355ec77b68769e258529a127e
SHA1e30de7e2990247eba09a37ad0b3ce49636d076bf
SHA2565bbdbf899de82b27ee714048dbaf25b404598e8e9620f607c1fb8c5398f161ef
SHA512ba54fb0e5ff41615d8ec72842dc4bff5ad647b46d522583293e4c89a8951ed036c0bdb2f9de8ffda7108e18364c54c8cee91498a5924d68cd7129c128159f20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55826f0ca1044f1c256b5cb4b5c9df6ee
SHA184f96e09cde8933c25b786866376cdcfa954f36e
SHA256cf2fec1d58b51a74986270b9a125c53b04357986109709b54e1eed0b700a879e
SHA512e1643279eeacb254ae085b0e18d223b695c8a4c77224607bb74813270d19145788241a7573b029d9df62732eee3eaf9b8cab1219fa6477fd4aa438a4fc03bec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534550232b448ae83446a17e7b27d56ab
SHA1b8a570103bc4aa78bb0eeaadb8ff896fd5dff226
SHA256c72d6663b7f99d11cc2bd7c7698853ebfca88961f4c61a4785c4377ab86a9dcb
SHA512677efc9253e4a5da47febc1d2a31b8a84be18c5b8108dd94e8afac744d98e57ed5cbfd984060e87950b5696ff336b481628c7a2f84262cd0f94cd527e8c14ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52037b8c8408e11efee1bfa2ed14f5a97
SHA1fd42ed1a7f9fdf39edfb86835b0f2d4584f1655b
SHA256681e0b4f6f602b4fbc6fb5fea899a51d5ee3f4f0040dc6bc4329af281547f3ec
SHA512130e691c0473c70e374d2bb5918f8e19109ecbc8bb4afca61ad49311bf49988b7295e748f99c28edef3e602499bf3b4dfef652e2173fa46e80ab30ee0eb09611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b21ea64118d721634ae6276e4641a0
SHA10e7e79e23515c543c546241589aed99c0a329c29
SHA2567b2b28236522439f02d65c6691e46acc869af5d429cdcfdac70ca8532cfab19b
SHA5126550731e31aab9334d1a833f54a5c7c1ae6de60734ce3fd5a7f69bb1b7ef1d237dfa71c599eb2146882ccf93d02f9b63961ce476cd285c6f8c462b6ec9a00461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0fe16049aaedc50ec86775bd90ca40
SHA1997b4399982dd55afc8e86804b7ad294920870ee
SHA256d17fd035cda9928b30af91ea7deb8109dd3b0b5238bf635fe8cba64d65653486
SHA5129924a263a2a5f8b6849d68bce4ba13f9c53499db33f4d58e86b8487cabc51b55cb44ae3ab9a2a008e17cedf60e883eea256752ef33677d18651c2b4a4aaa27f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d975915d6c93321f22dba69f18b73d78
SHA13e0c040d3420e14d9c597d0765f4ab70997928c1
SHA256201a35f79b9c5ae74414b56096ed8743b353fc4d927557bde2c44c6ed0434ae1
SHA5120f5579d9fb46770ad766b1f410a83d2b04ddcb3170e47f1eb6858a66f88dd77e018384e2e42ba6b50c3250ac05b2805d6eb5541ba3aee692b365b3f724510430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58c28afc9442d1811790de8285c183d
SHA1dd8a56783bad06a0dc05cd0a853fdd1b03d2a762
SHA2564ff590bb5ffdd3710073bfb27989957dbbebeedcf555f133c1b897fb4e422c28
SHA51263d3a2cb804064fef4ea98136fe9e78c2ae34f2940a5bb12b4200cfa291c9a8871181aa6723a945021591328e88252877a02569e9449012943da1cacef6b696e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fc3d44636c4b72230927a2c052d294
SHA131862e3f8c2a6624eeffc4c3d9752731151fc259
SHA2567cc6984eabb9a4f53d8186c988de5bd4b261e8dc825b1a79b4013e41086cbe9c
SHA5121e77a261b7dc62a8fc25a7aef4db08b0c65cdedbac7569f23021e48b046f3dfc2d58f9d833a2c14c46e987f7903eff8b37cea360e64e03f598694f82b84d0a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bef8421c2b63dc1703b560a1908110
SHA1bec0b2fbca6fc57f3eab505002a588f0c94ec540
SHA256a3f9ba4cdf9d92126f512ab1f98413176c95487806b7f5827bd2f858cd83fd8c
SHA512c05891444c96b7d98724ca3dc2bbfb8463e8da72c6906b85af6b449c08ad17f870402c93aec606fed1bf57bf5f14edd4da29085d7dba294f3faea204efa8916a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abf1e63264d36ca65e297a38c5dd6a4
SHA14f19b73baaa4ff46382f20c01f60814f27baf711
SHA256e43deeefd7444ac31acb67d6cd4336c84be0c5f4bed82942d75dba3fd3c7e161
SHA5122db6b56b649de6491217587f40c60e659e8decce1d762e276559d2b89da660bbe942aa42979455c1cf3a2dff58a970c8695cfcaabb607d083843c4dfcb2599d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21e229be16c38974a4d0f1f09f224ca
SHA1f78a8c6915e479b0840d9651996b367069ddae91
SHA256ea90260d65a20eb86d0e58ce5522c7ddf41b87adc9e620d71134674d150e1dbf
SHA5127e32b559dcd6e0573dd47f4ac2f16683e96832054828161c8566a30427e1a9a9f460ac4ce05bfb9b72e5735aa138a8c3df106715b59c538c0de19d5895de5379
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a