Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 21:25
Behavioral task
behavioral1
Sample
2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe
-
Size
191KB
-
MD5
2ddac264fa32d31eed68c3f46fe793e3
-
SHA1
eccac28f065aec7080299b6ef7da26962527c013
-
SHA256
b545c1b6080c24f24d6807ec74363b4983fd0c2c3d0ff3acb5f057bb42127af4
-
SHA512
39cfe52f74cb1b90672b0156d1990add4cb8a5eab3f8446368363b25f07c380229a6584661b70db8051287dd483b4136ea21794698e0a5cb0d28783b7eca7f4b
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vD:PWfUkBPyrtBxgQTMK0TKpxS3H8j0ba
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2676-1-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2676-26-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4F0E931-3DA8-11EF-987A-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ba09033e8f5db8dac29b7397357eee75efa9330a5a0036eae5a578855d0c1a6a000000000e8000000002000020000000a20e95876e257f0faa6115962ad41cbb1c3a103a546e9bc6b7d37480546ebf8c200000005c7f73d861c234d895b422f8462890809d10b694252264cccf7594c9511212e4400000003c54fcce6c0a68249210f639aa9250a633a26fc34c91552b285f20afd32c5ab439276afa24c16a9c49fb8707c9387bc29a9e25d610e09c95c348c92e535b4b96 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426659894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9026e992b5d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 3060 iexplore.exe 3060 iexplore.exe 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3060 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 31 PID 2676 wrote to memory of 3060 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 31 PID 2676 wrote to memory of 3060 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 31 PID 2676 wrote to memory of 3060 2676 2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe 31 PID 3060 wrote to memory of 1240 3060 iexplore.exe 32 PID 3060 wrote to memory of 1240 3060 iexplore.exe 32 PID 3060 wrote to memory of 1240 3060 iexplore.exe 32 PID 3060 wrote to memory of 1240 3060 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ddac264fa32d31eed68c3f46fe793e3_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.regnow.com/softsell/visitor.cgi?affiliate=36566&action=site&vendor=11040&ref=http://www.fenomen-games.com/_files/chromadrome.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f01cbad689ee07aefa189589f82a01
SHA1beff5cd1441b4bda86ff4f75da900870c3c17006
SHA2560d122b3924e148e93dd04c675622bc3c78a97a89f20b7a7fde87661bd50a2576
SHA5126a6b923bdddcf83b16c68ddbb1ea52e5a74af663a2e19011dd60c14c29733d0e5de5e4fab5a02d05c722f61182edaaf009d9c8b059bcdf21489be0ee1d4adb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce3efdc94b662a274a766dedc9ac309
SHA1c320c9e0f475a6a008563b969a83aa8254fee170
SHA25630bae3c83a83615822841032fe3aec5c058c21fbfeca1444a1dae157fc8d9ce8
SHA5121e1100bf472e8f3fae2b5a342395b548c1a6daf4b73014c44836e33aee304cd28c491bbec6dc867ed8652d7389c52a31a7079d99486d953cfe3559d1519314c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeab15d2aaca6903f95d670c88f70fd0
SHA1db46fe7f3eb71da39496ad092a89516ed7a944e1
SHA256d5212156f93a422f2dfb6edd7b0348a4a5b17deb83b172885c44e075bd257aa1
SHA512530e3a0ea9ca6c29a769dcb9d475c6712af31d0ac3e0176d37c97b6ff6eb21e5b649dd8a379cba3cb30356f3422944cb08b8b23e69b7d90ef4743e6ca17248a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e168e798dbf6a643071b7b0d27d370e8
SHA16d30d1e75d435b65e8c19eb831cdd36eba86199e
SHA25606f6e5158db1ded276144e840b5671769fb7530f8b1e134a0ff0981a133a6439
SHA512e1b9d2ba609b530fdb2ebc72506eca9b7c39c8feb37d86204d0e7a6fec68d33c666d9fe34aaf400343550f842c0a8262a257dc59dd801b271fd37d3ad23c6f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501092e940c9c36aa62cf14d4a7723f0f
SHA160c52586dd6c7f77aa10b3b993c5c2ef9be2c575
SHA256dcaeefea56195883c783442f5cb09754d6b725fc2d9358be16971a11286810a3
SHA512d476d8b90ab37e7524aad09bd0244b8e182db3c6ebd3652afc616a57e2e48fbef56fbd851050167ab508a4d954840726e1590c9d605b30db9f4734068304d4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefbdc4e39a7fdd6c9c47a77ecc77aad
SHA1cf5b9ade0873f9124ca75884da43b8efa0c6f5b7
SHA256f6746424540a989e5bf160a4726824d5ad3ae4faad949f9f4e741efc32bac895
SHA5128c329b7ec8d6831c320d382da1c0f4878f9f4bf15d16911282429944a3d0c9459ce145ada085a3209b5e79bd250260695ef4e7f0bb25d2cc032c0bd272979aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52febf3b3c5162bf1508bcc734ffa967f
SHA15c8f01c778107b254d48587024ac502573260547
SHA256f84aae7f138dd3315919afde1644497cf4545fa1e9efc61ae4dc6f63a119c9ca
SHA5122e1867c828e99df5c3c781fb89f31b2fb09090fc9d1338cbcc2442c5d36cbcb4ca2ed10514dc4d2f4254d41fa53834286984d9522bcbfb92cfb9e008872862a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7951291a53623a53c9e93faf621818f
SHA12b9c2837470173f54bef8a0d9ede089786e19b31
SHA256f2d5491bc7aaaf42d1ba1436194caace6ae458ea49d39251c0e7e6d72ff029ea
SHA512a5178e814ca04d8465749aaba79003500f1a0cebe0abce05159a6cea080a3f8e5a41cfa29fd93daf6c952190229c657daa453ac6df3bfa5ac2b9dafc4f9fc45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9a3e123d2cea4f06657475d3457392
SHA11f65c2ead6526a1b7cf31c337ede5a08ac4b958c
SHA256c782ce8deee57012af7194b4f472b008a36f6fb036563366894e5f1965744736
SHA512e71a06fa0c7b89a5df66f59db76c7fd8d3728dcb22799c10380e6efc536148c14b703d1c7100e66e9474b535bdf6f55595df5fa91e94bc3fc63bf6ef61f9908f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa88bf925f60fcfb61937324ce21addf
SHA11c5aab77cf75d72efd19a30bbf69fc08ed257417
SHA25672ac5a15250b45d44b53df4a9308194aeb330385ff7c960c706d8986a0332085
SHA512dae430bcf6cdedc75492c54dc4639016d2e84d1ef6c253be5cc0f9e8ee703e8a1b972bbae50f7bbd79098005b2dd43a0d854207967d5fdfef6030ce24d04762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479a75b367119bc2cfc3933950f80cc1
SHA13eea4d77ac14d1828ffef304664b66b90e0886b5
SHA2567ac7f51b8e5cebdfe92d879a38a4e259ba0209b35473bdaaf7d661cf2c930831
SHA5124ed3435f7796346446fba146094369ff9fc1d81fb7e93cfabe3841163684329db090dcd62ca749da6d32adac513f805612cb21acf999dc8eb6538480270341f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652428975416e5910ca5710972a469ad
SHA143775233ba14bb63fb5c54f288cecccf735571fb
SHA256b2f312538cc63742fcb5b53dd4c80a86735ab1c4c485315c18a72a15d7f67903
SHA512c761fd204396cacc34aa2f45ec8d0c0d31345b4f5e6e3f9d5c1c8bb0460c67368e12ea8d91b00e846b7dbbe2229a9fec09822332d4a42ff79155d2d38ad986b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584788014d0a2dfc0d9fa12e395b72a25
SHA1f28204f6b466387be3b1a91ebd4f0796063c3a48
SHA2560ab95a6f83f152ce049baaf453f45bfcbf7a7bf3d7c32db8ef8ddd9f1d238f16
SHA512973cc67bd471d2319dbf562e9904fe43489e1b0d9dc25dc17cdfa0731fb1ac198738b4c202ad498ab184cb7bcfdd0a17c84b206b9509df8fa5ffd52e3346bcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503297f73f9c3674af4fc801337a66ff8
SHA13ef758def08cd90487c8a81039c6e7b69195fae3
SHA25611ed40e0b34cb234521d8615ed5853341a972c465dd880297534e35fec9798b1
SHA512e9fe97600cf023ed1221666aa0080e3d210bacf3359c21c3a7e5e26764914ce5ef09985ae2c45254b8485c6d07ffa2d6d384bcafae37ec9884fbf1c8cadea58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eacb2832c0c212c849ce18904cd8f3c
SHA133d31c523ed3dea1cdebdb3603229543ea8e06a1
SHA25609e67777240cea5cd0c310d796270dfc49ccb980130dfae3f89710dc59b4d79d
SHA5128e05adae3f9c3fe4eb0f6f4f788120ade227ef643c303739ea0e9d22d1d5c1de5aaf2dd0ead3b9ee913ea57b3f1c2719a4f57400310b15c3b59d07d281d298dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8dd6d05b1f64b67557fc1df6d80d64
SHA1143667b940144a6ddbc64ff6bcf460535f711c61
SHA2569c040507401bd00402bb69385d2a5a0aacbd61004a9cd3b4167ac5ea082cbefa
SHA51236e50020962c96b83c709b5a05c3e69af33c8cac7e7920cbbffc9eb57f254ecf0912df22186115de42447f49a65ac257e8dc22756b48efb075554d94a2d2ba59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40f5295261d07e3aa178dab316fd619
SHA1e85ea02a8725c0f8a445e8b0a85762607398922f
SHA256aa48055ebdf449ef2d96011a51f74ef09383bf220070e4d9d6e11eb0140ec9b6
SHA512e1499c2c8c0dfea7ab642ad806944ba1cf7a7300894f1b7d05a9657f423edcc62bb1e784b4bd7d4dfa9c5800ad3d01f83e44aa15dabfa5366effccb712baea7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c7ee4bfe52109bc976858d0f88f291
SHA1da0190678140ff42bb872007b01103b868c3f206
SHA256c592792410d154b02e2238f86d289e3d45d1c361408dbef500ec54ec3e0d74c2
SHA5124673eaff0eba0adf77d524fab9b284e7b9391345d85bb9fb491f76e66517ecd5e4a31048d5183d5f0ad03fd83367e5a91dd710a136acdfc2e69fe2bb8ad231b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da295e4d7b37971ad57c514672615da
SHA1c58f389b9501b253aa864342d1638b245abfd803
SHA256d09cf1077932fd36f09800ab79544b1e74be19d5c883a599c33464fdef1b0242
SHA51263a42edf6a8b273b0048425084208aea2f825514073c522523b2253042b7b58faa0cec3754609d056fe5f7f9997aa9316a7a9961a643baa627ed2314cd0e5fdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b