Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe
-
Size
416KB
-
MD5
08c8f7e3cb8e150c9d3a96931918903a
-
SHA1
2fcbd3b54a7abe77fc9daed42cdebccd282361b8
-
SHA256
9388464615cd8b99a3025429ba1e96c74c818f5e967ffd2afc43c347c211ecb3
-
SHA512
79d171d6254b68b4eb4e8dcffb90e32caa20550f1b622ae85792feb4c6058912abca053f379e160f616de6049d7b4e95979e6d6b036e2fbad66d4162af1326f2
-
SSDEEP
12288:RPLGaCM5Ulu+G/mXL27sIjmCNf3a/Ba7EBBV:hLJCRu+GuXZIjhf32a7ELV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\msqmx.sys kb20060926a.exe File opened for modification C:\Windows\SysWOW64\drivers\msqmx.sys kb20060926a.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Partner\Parameters\ServiceDll = "C:\\Windows\\system32\\icxsnb47.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\msqmx\ImagePath = "system32\\drivers\\msqmx.sys" kb20060926a.exe -
Executes dropped EXE 5 IoCs
pid Process 3200 Program Files (x86)f2.exe 3972 rundllfromwin2000.exe 732 rundllfromwin2000.exe 3976 RUNDLLFROMWIN2000.EXE 4368 kb20060926a.exe -
Loads dropped DLL 5 IoCs
pid Process 3972 rundllfromwin2000.exe 732 rundllfromwin2000.exe 3976 RUNDLLFROMWIN2000.EXE 4704 rundll32.exe 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Program Files (x86)\\Common Files\\System\\Update.exe" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE RUNDLLFROMWIN2000.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 RUNDLLFROMWIN2000.EXE File opened for modification C:\Windows\SysWOW64\advport.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Windows\SysWOW64\icxsnb47.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\icxsnb47.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Windows\SysWOW64\kb20060926a.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Windows\SysWOW64\wbem\weadvz60.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ocmor.dll RUNDLLFROMWIN2000.EXE File opened for modification C:\WINDOWS\SysWOW64\WBEM\ocmor.dll RUNDLLFROMWIN2000.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 RUNDLLFROMWIN2000.EXE File created C:\Windows\SysWOW64\advport.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wbem\ocmor.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wbem\weadvz60.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Windows\SysWOW64\wbem\ocmor.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Windows\SysWOW64\Score.txt RUNDLLFROMWIN2000.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies RUNDLLFROMWIN2000.EXE File created C:\Windows\SysWOW64\rundllfromwin2000.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rundllfromwin2000.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\Update.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System\Update.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Program Files (x86)\coolsign\coolsign.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\coolsign\coolsign.dll 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Program Files (x86)\coolsign\uninst.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\coolsign\uninst.exe 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\System\Update.dat 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System\Update.dat 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\HotIcon = "C:\\Program Files (x86)\\coolsign\\coolsign.dll,207" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Main kb20060926a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5} 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\ClsidExtension = "{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url5 = "http://www.3839.com/index.html" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\Default Visible = "Yes" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\ButtonText = "¿á±ê" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{1D901067-2529-4A9B-9B6B-7A1DB3A44CB5}\Icon = "C:\\Program Files (x86)\\coolsign\\coolsign.dll,209" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.kzdh.com/" kb20060926a.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" RUNDLLFROMWIN2000.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix RUNDLLFROMWIN2000.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" RUNDLLFROMWIN2000.EXE -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\InprocServer32 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sss1.sss2.1\CLSID\ = "{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn\CurVer 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\InprocServer32\ThreadingModel = "Apartment" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\ = "QuickBtn" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\ProgID\ = "sss1.sss2.1" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\ProgID 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\TypeLib 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sss1.sss2.1\CLSID 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7} 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7} 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\InprocServer32\ = "C:\\Program Files (x86)\\coolsign\\coolsign.dll" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn\CLSID 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\Programmable 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\TypeLib\ = "{933DB9D6-9447-4EFE-ABA2-EAF3B309B44C}" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\VersionIndependentProgID 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}\VersionIndependentProgID\ = "QuickButton.QuickBtn" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sss1.sss2.1\ = "QuickBtn" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sss1.sss2.1 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn\ = "QuickBtn" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn\CLSID\ = "{D1BB7CF4-4463-4e91-88D7-ECC3CE0A13B7}" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QuickButton.QuickBtn\CurVer\ = "QuickButton.QuickBtn.1" 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3200 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 83 PID 4660 wrote to memory of 3200 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 83 PID 4660 wrote to memory of 3200 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 83 PID 4660 wrote to memory of 3972 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 84 PID 4660 wrote to memory of 3972 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 84 PID 4660 wrote to memory of 3972 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 84 PID 4660 wrote to memory of 732 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 91 PID 4660 wrote to memory of 732 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 91 PID 4660 wrote to memory of 732 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 91 PID 4660 wrote to memory of 4704 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 95 PID 4660 wrote to memory of 4704 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 95 PID 4660 wrote to memory of 4704 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 95 PID 4660 wrote to memory of 4368 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 101 PID 4660 wrote to memory of 4368 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 101 PID 4660 wrote to memory of 4368 4660 08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08c8f7e3cb8e150c9d3a96931918903a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)f2.exe"C:\Program Files (x86)f2.exe"2⤵
- Executes dropped EXE
PID:3200
-
-
C:\Windows\SysWOW64\rundllfromwin2000.exe"C:\Windows\system32\rundllfromwin2000.exe" "C:\Windows\system32\wbem\weadvz60.dll",Export @install2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3972
-
-
C:\Windows\SysWOW64\rundllfromwin2000.exe"C:\Windows\system32\rundllfromwin2000.exe" "C:\Windows\system32\wbem\weadvz60.dll",Export @start2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:732
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\icxsnb47.dll",ExportFunc 10012⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
PID:4704
-
-
C:\Windows\SysWOW64\kb20060926a.exeC:\Windows\system32\kb20060926a.exe2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4368
-
-
C:\WINDOWS\SysWOW64\RUNDLLFROMWIN2000.EXEC:\WINDOWS\SysWOW64\RUNDLLFROMWIN2000.EXE C:\WINDOWS\SYSTEM32\WBEM\WEADVZ60.DLL,Export 10871⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5e25063be2c7d0a6892a5789d0697a20a
SHA131daad687ccbba072144d408c8b693054426b6d5
SHA2569c6baaab819eea4bc2ca846cf44de3b2f15913a33b2dc31081245ab864b99f11
SHA51257f4081bbb35296f5641b50444d086eeb0184c5fb8482a2634f3582962f7344734b183fc119afdc5d7d7bfb913819295a70f9bb0099ef3446f8d246723002155
-
Filesize
50KB
MD5f04d24275e0db8685b24d8973bf84624
SHA188cd499412ab380599137b7d27f47d528ecaa677
SHA256a4fa277f28e157a4e9cd2710ff7126a1482e6a6f3c90eacbe62c6bd85a8e08c2
SHA51269194065ca52cd0c62b3024f646bdcb3a8bcf67aec64d5c74770a941fafd8bb8c3d854c058c5341b03714a8d6069c2f6cda32ec068f62b23b3a0e564a8319105
-
Filesize
5KB
MD57ea37288e136b0651242db284793a60f
SHA1abf79f0691d56596f19755f44fc53103afeb4d03
SHA2563485e7a46119e79e5feb035dc122e3b83342f6ea0a2b4fc3e8aa84afd768d220
SHA512c466c97bcc9fb1ad3bbab3da7b26c4f9aa1ee6d1fd26c8f4ea8a03f1ac987b29c366a2d3e15bec30bda7297f9f8edab5cc9a37cc175af618b65da999f389beb5
-
Filesize
231KB
MD573a8a5cda0839915902a9fdb85d1bb9f
SHA177d39c275f1ea3fb7fe31cd8130702b62a88b282
SHA2569c84cc0711cc5bdc19521ec30386d92cdb3872c28055b1e8343bd5d9ceffed8e
SHA51278aca2a9cf9f38560a8f8f307976e0489c150d1bc2e9f00f7cc8cf7d77a2e2bc5b9240caa772a0093a9eb8c12124300b9ccc36bf2a9220853cf2242cbe40cccf
-
Filesize
11KB
MD540710057b6f1416d9625397803faa5ab
SHA138539f615a4c977a4946792aaf46af711ab34ae0
SHA256e4361512e69f0738415424cee95fee446bd1f875297bb76613c0bff056b2698a
SHA512f7687797ed982af0ac8db3123ef47e03242f3a36108ab4491c0c67894a1c649a20aedb2e2dd0da60769ce6d77d0c27c45f56e704095496f3030a8667f7ad8a88
-
Filesize
10KB
MD54936a6954ed59700a3c706f9094685ee
SHA1124edd171bfc8a5c7f5fcf2147f6ff43b705bb79
SHA256e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe
SHA5121ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea
-
Filesize
231KB
MD57cc10e8530f72724c3a80940181accfa
SHA155bc30ceee3aaf899f9f36e0e6649a0f375d0b2b
SHA256112ce1e329b913e0634635fdb003ce2c81533c001a8bcfe9d2fa4ccfda055571
SHA51264817edf6e0325b9e29b7eff827ff19d58be2a3ce45047a57bf9f51ee8ba614ee5b9d1216941d9bee357098f0e6129475292ad4f6688d962b155acd1811d6093