Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 08:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll
-
Size
159KB
-
MD5
48f22300d025bdd32df83777cb07b728
-
SHA1
7baa39f3dcc34b9eedc1e8d10c84a87213683e24
-
SHA256
26ffd6dfc46314ff1cbe2299f82db84567b805f63000cae1b47b5dfd2aae89b7
-
SHA512
b59b8bd172ee73fb73548c07fc1fb1c2228e6779e85495c5fdeef2e661a79c3693d0b22e84f1cbb06290c6e5e12a7575ce3e384b9a4fdb393537b8afafb3dcad
-
SSDEEP
3072:HRccpvUG4OmCnxYWI5SEsjCkoxNSzQF9eSkWa+2Fr2TLSO85:yYU7cJcZZNIoxkT+Yr2nSO
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1296 rundll32Srv.exe 1172 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 rundll32.exe 1296 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000e00000001418b-2.dat upx behavioral1/memory/1296-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1296-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1172-17-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1172-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1172-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1172-23-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px1610.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0703151-DD53-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444215539" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1172 DesktopLayer.exe 1172 DesktopLayer.exe 1172 DesktopLayer.exe 1172 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2120 wrote to memory of 2100 2120 rundll32.exe 31 PID 2100 wrote to memory of 1296 2100 rundll32.exe 32 PID 2100 wrote to memory of 1296 2100 rundll32.exe 32 PID 2100 wrote to memory of 1296 2100 rundll32.exe 32 PID 2100 wrote to memory of 1296 2100 rundll32.exe 32 PID 1296 wrote to memory of 1172 1296 rundll32Srv.exe 33 PID 1296 wrote to memory of 1172 1296 rundll32Srv.exe 33 PID 1296 wrote to memory of 1172 1296 rundll32Srv.exe 33 PID 1296 wrote to memory of 1172 1296 rundll32Srv.exe 33 PID 1172 wrote to memory of 2196 1172 DesktopLayer.exe 34 PID 1172 wrote to memory of 2196 1172 DesktopLayer.exe 34 PID 1172 wrote to memory of 2196 1172 DesktopLayer.exe 34 PID 1172 wrote to memory of 2196 1172 DesktopLayer.exe 34 PID 2196 wrote to memory of 2804 2196 iexplore.exe 35 PID 2196 wrote to memory of 2804 2196 iexplore.exe 35 PID 2196 wrote to memory of 2804 2196 iexplore.exe 35 PID 2196 wrote to memory of 2804 2196 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55381ae992190701090ea6e3d97b278ba
SHA19e670ac556db6cca88cb2d409aaea0638d616a51
SHA25632fbd5c53851509cda5a757cdcb96cff6fa5d2e5d7f09a955468c2a1f6da46a4
SHA5122b96a5e9149c7caf0ada8a9bd9e219b10c4803d14848efe47f261b24e66521398ad6dcdf5a95e9f612040cbfe6e11b6ca2f398368c00711a63841c30561b62ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50abf8e97133a8fb92d5266e37899ab61
SHA1f6c00dc265bdd37850d72f453c0071b26db252f1
SHA256ad4d4cd2031aadfec94f3c09eb8fa95381545395c0d97c72f4737d25283e752f
SHA512338512d554e161b63d97fd2e3898ca834d7fda2b617e3df5e663974dc690b3272bfdb2e16cece77597c3fef6ad5aac01c7c9eea05f982cea997ce57c6c33faca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759c4ba606ff06836989c03ce5bf58cc
SHA1402d76ec8476187110fd5965dfbbea171b6fca68
SHA2567c96a38d01491489045ea60eabb041e86b47fc7454861d7fbbe5671db17e48b9
SHA51237b60460c9779269efdd6f13755a3c9ef0990648432ea39d6d87e5e5d3e25bc428b45073806710deb64ee5448be7d8b76ce86b0be5fa53f7b5a4d4c9cd2e177a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529462c3ecfb1b53035d2dbb75a5265ea
SHA1b70cf3e3bab70944ad6d4edac88dcb16f2494b98
SHA256d2d543e8662c45a1005d64b8fe2c33bcb969aaca221afdc8d5649aabd6be6714
SHA51275d0484a95e4ab71cc68ecb4d2b024d26de36d0e76769996d339b88b45119c46c747e3c8bde310418060c17adbe3b6cd0abc3a2f286c74cb02d0e05ce926dced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51585706d432a9b68f0862e9b2594ef43
SHA1d69471e5607ccbf56a1a004617b8cf966182b535
SHA256db7babc5e0e5ddbd10a7a8891f9e58c569639a670df5865590e0547ab20bca7b
SHA512dc25abd31aa387d828f87258f43587cb45ae56bd9f854202340fea44b406ce79b6ab5e729b44320c3512ce1e0955c447e1385465bf019ad5d4ce0d2d83630cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb983d7785ce95629675354930af081c
SHA1e0126c0a0c2bb47a4a92a463704b41d49f10ac30
SHA2562596e0ba4aabc72430e5928fbf938b8c43cb72198bab022950ef2771d995491a
SHA5120db782940f16ecde4b2f0f7a4600e45ffa2f4ebeb53b00bd39e6bc8dfa710a514399920909ec1f89b848c8a6bd502770d10cb985c3b858f776a56c9c5b5cb523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ac4b7fc10e7d9b13feff2d42c41224
SHA1045e6ddaf6fa6bfb27cad78a038b17455a07f840
SHA256eb86bc33b13ac35f9704e668b4d52c4d56afc85eaf48dedfc6678ef0fb7dd13d
SHA51283bd96b28e3d739a75dda15d5d036115f62da18e58c88586a79ac979953eab48e7e5a6d3c1ddd5dfa33817350de35780866c8f09202e28d6d221bb737d0a52f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a0d7204da3a016fa5bf673b5684646
SHA16be7580a35b35c5ba3f8cc76c1b37afc6a3c6db9
SHA256b21ea434a41f68c07074c5e538055e73099e6d4a688af4383054c9c1ad3d1cba
SHA51254f471b5dec28d235151de3ec8483498aaf02864a71ddb522b7128a904464cb8b2c41f6580ab1bb11ee8d3088060bfde481218dd450ae12101cd5caa2f67bcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da36e9e28f17d4e51ed0664f7cb7cfc
SHA1311688840907c8b15b7472e28eb55cdcbe2653c2
SHA256016bf2a499961b731f83ef111abdb0b50374b23a9ec829c0a198993f404168b3
SHA512631280fd41272ba1c7df237c02ce9ffeedca9d60b6fb803566438af2a002a78ad990a0ce9177e5a088d18215dda7b0c3e077f595737b32606fc522b8891b2383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c3840ad0091e0f7883fa318548b7fb
SHA145d27b411bce0824e09abc49f6122e5565e8fe1d
SHA256a86677a753a4f16c76ff3d839c2d065ecbb5ca68f27726e28c23a3ac257aae2b
SHA51226473b35496475cb1a0ed5a23ebe6e81f20480eb65bad2ca88dd0a3445d32678a074e81c181b57305000348666a4420cd7c3383f1fb3eab693a1fbc0c1e57246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd45c399fee6cea0acc925c82e157809
SHA1e5a8af23ae6e3aed4008b65bab4bab2c10232af2
SHA256cc0608bbeeeee1ed1a3da51081f99e2c314ea7ce2d00b81c6f120425b0bdfdad
SHA5121bcc00e94db825fe724b84ceaa10011643d5474386083fb1efe1a9f56ed0a87dd1081383ce83609805d380b9a0b5bcc0ed079e4d9e40bd23052de534218cedd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556eef9b1f11670bebd91a71b7cdf4528
SHA15f4bec43575a1bc7a3decc09919068c3b5f4891b
SHA256c002ee29a9e01083d6e4c43634c10ca5eda8f846c52e1b8f5f45dcf0643ee7eb
SHA51279b8e987e57c305019dfcfe5133f5a2b6e86cef1a4023fbf56c74df4c0ce7db1267efe3f77ed6e068f6f52264599de1592790b700b8393a28413ece52512db7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9f4e61dee3f8de6fdd1f5d9124a16b
SHA1722ee4ec484abebd570a4f521ae1b6c217be3562
SHA2567637f91e3db2098f3ad79f0aa4cb3f7f3536792dc2723d22a248b24c7926aaf5
SHA5127dc9132f88203001698da75d1bf230934d9cbeb4a9b00a061dd2ff99371e8e720489c135a1dbecb294b408219f515ec57649d9a8e4ba54da53a90adeda009ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e458d1d17e0a32394a086ba4c14b3eed
SHA1149bbc0ee770390d0f084dcd4ab47796193f7b8f
SHA256e3d6843c8416c2b160b981facbdc44359ef1e376df634bf06abe19f22a164885
SHA51259a3d314d8daa1fd8c877708b53c516146f5a2b3e51cc9cc4362348f037a2bd2827045654e4ce381e5f83396fc64c3c7922760325ecd622d9e64fde15ea20461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0de36c9a9135b771b21f2492c16ba2
SHA1175aacffcaf9d095086e0eb743e45d09100426c7
SHA256e1ef34a5644e57ccc15b0383d914068bb66cc6a06bb093a17b44a1cdb052f263
SHA512d410d17cbb8f4c345a126827356a8f3a627c731b226fe7e4317588e93818d1505153264e0f8c9f2cb5be2e0e63c3827c562b8188ec67a5de09b8cc42b6d7ceea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031d284d8381905b5350baa6909b9ce8
SHA1ede0007c012ba9cdd410c8444264481049b06532
SHA256830fbdf7b691ca04a5443252a45d5d793410f56a5c567332bafa4ff5bb35a7d5
SHA51276138929b91950a8a6db441ba2417dce2dea9ca0de91615c33ef90947ce760b761fca2ae6c49a3967bfa07a81aaee25a1d838bfa825fcd8dfbe33b7f9184d417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58231027f91ef4d3d577a236f26a15aea
SHA1aa4d630f5d98c0c2c0e697667bf99189567cedd8
SHA256d4f096ed1d9e1f2aa8e1fb68db5c3a845f84a71b85a38a2de7fb19bc5b737ecc
SHA51249ec0675f4865c9383adaf10cc62ca724df1a9438ea99128b786ab1a31abd4e2672dd982ece8caa5bdfc4af266179982abc34b656998927b2de3fc73e7ff35ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385c7b0f51050633596ac413f9838996
SHA13bdd116dc0044f37ed2b02e8ffab5d60ed8b94fd
SHA256698cf75008d130ac596a67999b34cef4809c908a3add6454e0f4774e0be5cb7d
SHA512d0a328a230c1cd31b706d25be2c9ccc59b56b80b078968a2005ea8f401d6b4f617ffa57e0c0557736a7946d5b6f669c268cc91b6a6921aa415a0ce8a488c5e32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a