Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 20:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll
-
Size
796KB
-
MD5
6f6742b8efbea63fc49633747085e544
-
SHA1
bf7fc1b24fd2fcce0066ced723db34912e28119d
-
SHA256
3fa7f97e8f151e549f3d3292cdff5f102d7360441df482e1ec108339a629ea69
-
SHA512
cbe6781966fe9a8630006e4e6f0efada70b59a41f263795b9d1b54c10e2637c9f8bbce0118cd21e2a348bf66ebda44ed912b23b9c495ce0b052f28e94c090223
-
SSDEEP
24576:rSg9auyPl/1OhkbJK+YLqKw+Jx+DROSlM7a8eb5:rSg9auyV1OhkbJK+YLqKw+JMD8SlM7av
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2560 regsvr32Srv.exe 2348 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 regsvr32.exe 2560 regsvr32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32Srv.exe regsvr32.exe -
resource yara_rule behavioral1/memory/2548-4-0x00000000001D0000-0x00000000001FE000-memory.dmp upx behavioral1/files/0x0007000000012117-1.dat upx behavioral1/memory/2348-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2560-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2560-9-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2348-20-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px99FE.tmp regsvr32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe regsvr32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe regsvr32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B5CBA01-CA11-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442098058" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2348 DesktopLayer.exe 2348 DesktopLayer.exe 2348 DesktopLayer.exe 2348 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2380 wrote to memory of 2548 2380 regsvr32.exe 30 PID 2548 wrote to memory of 2560 2548 regsvr32.exe 31 PID 2548 wrote to memory of 2560 2548 regsvr32.exe 31 PID 2548 wrote to memory of 2560 2548 regsvr32.exe 31 PID 2548 wrote to memory of 2560 2548 regsvr32.exe 31 PID 2560 wrote to memory of 2348 2560 regsvr32Srv.exe 32 PID 2560 wrote to memory of 2348 2560 regsvr32Srv.exe 32 PID 2560 wrote to memory of 2348 2560 regsvr32Srv.exe 32 PID 2560 wrote to memory of 2348 2560 regsvr32Srv.exe 32 PID 2348 wrote to memory of 2116 2348 DesktopLayer.exe 33 PID 2348 wrote to memory of 2116 2348 DesktopLayer.exe 33 PID 2348 wrote to memory of 2116 2348 DesktopLayer.exe 33 PID 2348 wrote to memory of 2116 2348 DesktopLayer.exe 33 PID 2116 wrote to memory of 2832 2116 iexplore.exe 34 PID 2116 wrote to memory of 2832 2116 iexplore.exe 34 PID 2116 wrote to memory of 2832 2116 iexplore.exe 34 PID 2116 wrote to memory of 2832 2116 iexplore.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32Srv.exeC:\Windows\SysWOW64\regsvr32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6a9ffb3f829083b448bd1c3542126d
SHA12fa7442685888dd219f23de6cb07d2a766af9eb4
SHA256a3c7ffe73de293fbc82f98ad26bcc19ff427ab7ceaaa1ef3da5f37f2c51720ff
SHA51233eedc9a5220bb6e5f19173b8caae9d71e03fe2bb9257f0e2083c581c395b8ea6e393b32bf90362e40957f3438247941087561e2814084fc92f900441392b6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59249d16d1c785cda50a3483e7ceb356c
SHA119838c4df054c01d71d0d83f0116c232d9cb94f3
SHA256bce4cf493a2df32f0edabe2a5472160ed0ab2dde73b1e614d4c93ab1eac765d9
SHA512247cbb111d2e425d3c6345439db6104904d5a5a7bb4d478a6519eb6a972ededb8c00ba7e9ec6588f86bbbbc920e490b9c04095adf7e0b5447a0471837751e71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe9145cdda0c3c38b3ae90e39e0786c
SHA1024b9e02e912bf609bde05c489ce3348ba528e17
SHA2568b48600e33b2ae59db8f37db5d177acbd76a02a736a45f59a9ee5da5ea2a0804
SHA5120bb77b0373a9bc66b6afa1e0f154f39c705ecbe6d8dde367585d9f20166e954bd19e0d5f7e585cef49a7989d3312475b3e50b346b1714e9cf2b703b513a890aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa6d81ee7191e37d1310569bbdf4497
SHA156502c0db4ef12700eec01cc0a386785012567a9
SHA256ea49085beb47931a5a1be3aecc0786c9c556cc1275844e938081b17cdbcc02c6
SHA512cf92739e366f7eb1fd5f33f07db83d5ed627b0a6f305f78628fb944402030ec4bc8602a4779972e45c9dc9a6630ab3261c11b2b95221ee663ff87531a92b1b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe660c9a1189bae7f84e62209ebd88f
SHA195104d959c5cd2bfd011b735b2611dbd4911faf8
SHA2561ce1a8d35899f8e781f58e737a20681e97f6c4f5287f40b420ba7035fdc31887
SHA512f45d37e070524cf455f707feba42662214f7471c497af2d7c73d6784b585df000b372cb0908e9a1a3824f9d888ef2b06343c83dd4e1e948839ef8b8675695608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c4c208fb20c1c34aed437ff5474db0
SHA1179ac3734ebbd14b5be5a72967166a9aca2fb9da
SHA256596b047e2a62307c00ca16ac7e16c07e46e279535c901de3ed47ada01737f59c
SHA5127e246ffb1fe38bdeb3d6d9a196e0112bdad3c1f95af93facfcac6303cfd3e48b69b02da838fafff6afb344546663f7b98d187cd4431708dd1ca0f2a4139e58c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c92033e720ad1e37d46bd0c99c3789
SHA1551831272bea89f72097e962c64234ce01dcefa3
SHA256bfce4befa94714c292ccb2a7d487c19b731290ae4344336d6e2a74d57cc5aacd
SHA512c2b34367730a5b3b5177eb0b4066d9740372a1b5165bf82c40702c89dfe3f7e41e1822ef06dfbd1ed1ca446d4b1aee7d7493adedaff0af4493c784de60bd1340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503863ff1deaece56ceee787c0571123f
SHA19a276c3bf467fe57c82ab8c540f823696af0be3c
SHA256576514d32ef6043b9bf30c8fec75b7c9ed2f9a2c626e0d14bb142779b11f089d
SHA5124f702783c3f383f8fd763c3d8139df0bd191496247fc790dd2c4df67c5dbd26b6e23a6073f60c011242fc1c1037c1a1c903b9d34cbb18e83691a09d891e812a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f001ad2d5aab1bb44fbc49e0785de70
SHA15929e9616bf748e557d21937df75d1802c81e71a
SHA25656506e788afdb241739bf6a74ee9de6660d1b23ac3bea1bfdef3a946599b18ae
SHA512d72648892a546e467d94db6e2a5285bdfb4f572b4b582630d36e9f97d4f086beb7951bb6b38410ca80160128a865d2dc3e097f6730399a8eb5e6b426bc19c53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3251f3eec6b4e8b3f6aa30d29cd91a5
SHA18e8199f96ffbc7e2c8ad8ca5264e47f7deb268e4
SHA25676f4cc86634d7d373985578c6afd64150a0ea336174e60dde7314566c65fc170
SHA512a16a1b3f9ff9af2e6072b3d2b6db43f4999c09ee152932c75d56a93adf941f362e93ed375b6d03ba8ebbd2f77f3b91597a2543db5534a3b6f55b8788d8cab2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59804df88229ecbbbcd16da833e2c530d
SHA14fd4bb9baf2326194d21a0b9dcb6df9a10f51c07
SHA25659b9fa5da21e23eb327e62b90b1e24870c328a5141d23cea66fe7311e5895ee3
SHA512906bb360188dfb0332f3565910f55fc1b63ceffc08b27708a658652d9a326852a309b9ec3d6dcc3bfed6c4bf4983e8b5e3b54b96592caf6852816df1f9fb6545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c969ae1705baae227e7e985e4b7bcdf1
SHA1a45768f43f98718e58dff1015a7e2ab59beb5517
SHA2568ea6f0e13a5d2475657f4f2a16b3c79fe82d21cc0b9e14a0e255f18b77537451
SHA5120cdf8f41981c4b8b239cf58a38f6b75b8026de4783affebf8aae2833d4ebbf725443540d9d21acb8e23579a4bf43e253afca134ee93c91f844bb31aac623a872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b9f2679f47c9507b38894d3320a59d
SHA1da506c0e70d5c55bf3ea3fc49f8dee1d794cc425
SHA256fee095f3072eb44649c7a8e6f1dbd94d041566d099e0481a7473f8d819cdca26
SHA512c547b75c3df0ab5cc218a885624c69d7255579334cf3f8b3ba6c15c276a57cfc9bbbaffee95f1f1c92edc1951500807b83dfb39d68e1724049c417f02ff07c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c97cbbba41302f952381a7c6dbaedb3
SHA1384cd6494832a13f0e5a079defdba3feae90b882
SHA256bf5cdd0eed6b01747c02ee07eaf3f2767b46f8f09b1fc94143b57dd6a2d1a3b6
SHA5129e96d770c6b44427008005b2e8e31936fc7e6a6f27245b54c627ec19993610f557d60c6935b924dbb31b08e57eff768437c3e89ec1f0e6547f8ff662eae55619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577428bfea372efbad2dde5c3462b66fb
SHA1ec2092f157eec295ed929702c7db71ccc4e766be
SHA2562b0ef303225ad8ecc28233faee76845f4c7608d17cd7a8964cdfe9e0da2a7335
SHA51299dd6a05aaeff1bbe0c06c46dec5db3b3aa0fccae19e48657a30ad44cdae14a045b435757484ac85f906d374029379b16178e749fc709f287499e797ddbb5832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599163cafe5bd79d09fe852f8c785ddd4
SHA19f2bd248240a08ceeeaaae7735666121a3a9e7a2
SHA2568eaf1c2b73088267aa141a2344d25ed90aef22a7a7ee04ae2351c7111e173cad
SHA512f9f5d94df914ef484a1f6dda8d1f4520b347fd6a0c86c1bae3cec5508e81e067f2b7900ac9a3df0bca045e07026bc4f1fd4d2a8365a467115210403a3db910ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57819b2257227a53cef0b9408d60f1b83
SHA12f8512f77a69a597b534f24e7655070e36110583
SHA2565e6ef3a9af72554483cc87bd1a951d3bda2def3dbe07a39b7bdabdb159105402
SHA512741a7a923e013e54917f4c7744911f1e4a8554d2e627f69fdadb934214912541a49ee21e577ad7bbcb4dd01e14d4cfdc02867d4b61c8b90bf1264780be9f678f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290c6558656419ce460022e822c9e6cd
SHA16e424da938b789f18a57cf30714dd3e1b3a56091
SHA256e90e07744b8211f03c42c1f1232ec9037902999f8ffb9dff674d85de025a3ea1
SHA512e6d4019b97e97f9f5cdfdbd74756de120e0463ee3c22fba07e1d67a9ae34feb2ccda42e6980f54ab694245dedba1206457ffb9dcf1ceee184e24dcb93b217748
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a