Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe
-
Size
48KB
-
MD5
0e377b7b2b51e4d9b690c2aa0b3604cc
-
SHA1
6e6e17d0ca99f4f311301d564e21cf7a045e47e3
-
SHA256
81131888d19771b5421ed602f51127ff8a591d5b0fbde4cdedb05fe039e67558
-
SHA512
6ded8b0c05ef97b9bcc37a3e12b1e58f6610f86ff25c8ade917166f1eed8f95cf6aa3fdd81b8384755e8396c6bf7ff2cc72800f4d3df7489e7f317df08c6b906
-
SSDEEP
768:/PrTjgdaFIBRZhy3vDFyhoYOL6aYjJnY4gQBNlBJI6d/Lysgcia9SnAbVoMUbvci:X7g86FhysfUQPW92njJmvl
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 5092 regsvr32.exe 5092 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ECD30829-E57B-479F-8603-87B1A5338B43} regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msws.dll 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msws.dll 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Win32Sock_2.dll 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe File created C:\Windows\SysWOW64\win32api.dll 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{367B95FA-32F5-11EF-9519-6E6D447F5FDC} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "182319817" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "185288445" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426086398" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "182319817" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115010" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115010" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115010" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec.1\ = "CMsSec Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib\ = "{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\TypeLib\ = "{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\0\win32\ = "C:\\WINDOWS\\SysWow64\\WIN32API.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec.1\CLSID\ = "{ECD30829-E57B-479F-8603-87B1A5338B43}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\VersionIndependentProgID\ = "MsSec.CMsSec" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib\ = "{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\HELPDIR\ = "C:\\WINDOWS\\SYSTEM32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec\ = "CMsSec Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec\CLSID\ = "{ECD30829-E57B-479F-8603-87B1A5338B43}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec\CurVer\ = "MsSec.CMsSec.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\InprocServer32\ = "C:\\WINDOWS\\SysWow64\\WIN32API.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\ = "MsSec 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1915C55B-2EFF-4EA6-AD48-AFFF4B8EC55D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ = "ICMsSec" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsSec.CMsSec regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\ = "CMsSec Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ECD30829-E57B-479F-8603-87B1A5338B43}\ProgID\ = "MsSec.CMsSec.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B42BBBAF-07C0-494B-9E9C-733B49DF4DD4}\ = "ICMsSec" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1296 wrote to memory of 5092 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 81 PID 1296 wrote to memory of 5092 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 81 PID 1296 wrote to memory of 5092 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 81 PID 1296 wrote to memory of 4560 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 82 PID 1296 wrote to memory of 4560 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 82 PID 1296 wrote to memory of 4560 1296 0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe 82 PID 5092 wrote to memory of 1852 5092 regsvr32.exe 84 PID 5092 wrote to memory of 1852 5092 regsvr32.exe 84 PID 1852 wrote to memory of 208 1852 IEXPLORE.EXE 85 PID 1852 wrote to memory of 208 1852 IEXPLORE.EXE 85 PID 1852 wrote to memory of 208 1852 IEXPLORE.EXE 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\WINDOWS\SYSTEM32\WIN32API.DLL2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\0e377b7b2b51e4d9b690c2aa0b3604cc_JaffaCakes118.exe2⤵PID:4560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b9b9f42ce6d2b20bf169d05480d239d4
SHA132b094cc2ff79f07fcd68d585846b919bc350e4d
SHA2564d16bb8c9a34d4de9d39bb5f0e87095617b5ad551112db17b38b6cb752fbdae4
SHA51236b45c544439c6b1fab4c2fa58712475a65ad467e3da61086c4a953d6587d35f5c6ae7de740863295ae0d3534cbf67d0bed6843d95b6786b50431bfeebcf1010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5d7df231fad6e4f1d5d8a37effd48d7d1
SHA142a815d175764cea2576a0b210ea804ee63fa0cc
SHA256f2ea7a41378be7115ecadafa31f74c7bcfe183a3c5d52be307c1dc78cf5e3208
SHA5120a4ffe5c27dde94aad7e5639e67ca37c2e9c338b37cd96ec032888f1a45dff2f1a2f8707d240a950ef64e85aec5648d693cdd253039697c26bc5cc60ae1e2cac
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
64KB
MD5980e21c5dc2a289a26c55523e8e63346
SHA1db4171e764c2255e145549b98e1b6b278d7a6d88
SHA256ad2ca0dac66fff2897fb2d98a0c9768fa23cdab20989a3d8a9e8de0eb2bef051
SHA512f819e74f9347a3cc07e0f1c24e0b2fa0d53751a4ea7e0e1ff7775bcbea5dbec8d3926c9f31ef2a65c09cf3e466acae447d6392c9a4952a8d94c610c36f82ab8e
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83