Analysis
-
max time kernel
96s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe
-
Size
48KB
-
MD5
308ea46860359471e73b20cee6ec5bc9
-
SHA1
e9c1ffa91551c496a52f981f4cf47ea59ecd8a10
-
SHA256
1c566f955ae38b87902dd3295c83667cf5c4999b0fa1e4d47d787598cccf01f3
-
SHA512
2f10790a9027e643ebf42731768dfef6a39e469693e6cf8c457f61f4fb4d50f065a25c1245db307e6f5606d218bc188bcc0e0515544c62ce666f3a3b69676ee3
-
SSDEEP
768:Cfa2l72cNicC8a5R8Hn5wZK5cGTslDkyq/qbLMDubKMgo9K8Adjl18v:/cNicmUXy/Zqtubgo9K8Adjl18v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation inlAA7A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2872 inlAA7A.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wbem\fxsst.dll inlAA7A.tmp File created C:\Windows\SysWOW64\wbem\FXSAPI.dll inlAA7A.tmp -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\LiveMeeting\rarExts32.dat inlAA7A.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2372821526" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117839" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062632f928728194692a4b61bc57d3e8f00000000020000000000106600000001000020000000dada7a7e38487e674bc0b575e97a9d2af379f87db0530b89093b9baeab04131d000000000e80000000020000200000008fb597444fa8c7c290d4323acb009e83739ce8f40c166bdeb05a5580ea39d5d120000000a5392d4b582a2d221b04bb868c0d6b0cec06b45b2a6dcab120143d70305506ef4000000041304c3a2a3d600c0bb16df6bec9100183d280704fffadaa7693e8dce52b2a6d655cc2ff38203ec87bed82de8c3625f62152b10bf6f1752b3158a592ad202e4a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B9073907-3E02-11EF-8BF0-4AA38301372E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117839" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2372821526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2377040378" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d2f38d0fd2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427301663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31117839" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062632f928728194692a4b61bc57d3e8f00000000020000000000106600000001000020000000e8b1ba141e966c41418bdd7678632acf8550b161a9dc25070204033fc6eed460000000000e80000000020000200000008d2330b7953fc897188e9c5a01fc3a08a156b2864d901f1857c3d654a8782ab720000000010a9bb1a60619bce1a699feca3dc636cddf560bd2c2ffae9d2eb425e24bf23b400000009beabd28f2dc90b4584f7f4bc599a4d7e2bd5fcbbc8776f07ee81d3bd85e1920456ef6f322064debdb65f3024b9b4f07e2f19148d6924a154664427a1a353b69 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9074048e0fd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2872 inlAA7A.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 3152 IEXPLORE.EXE 3152 IEXPLORE.EXE 3152 IEXPLORE.EXE 3152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 620 wrote to memory of 940 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 85 PID 620 wrote to memory of 940 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 85 PID 620 wrote to memory of 940 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 85 PID 620 wrote to memory of 2572 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 87 PID 620 wrote to memory of 2572 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 87 PID 620 wrote to memory of 2572 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 87 PID 620 wrote to memory of 5060 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 89 PID 620 wrote to memory of 5060 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 89 PID 620 wrote to memory of 5060 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 89 PID 620 wrote to memory of 2064 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 91 PID 620 wrote to memory of 2064 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 91 PID 620 wrote to memory of 1748 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 92 PID 620 wrote to memory of 1748 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 92 PID 620 wrote to memory of 1748 620 308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe 92 PID 2572 wrote to memory of 3092 2572 cmd.exe 93 PID 2572 wrote to memory of 3092 2572 cmd.exe 93 PID 2572 wrote to memory of 3092 2572 cmd.exe 93 PID 5060 wrote to memory of 1800 5060 cmd.exe 94 PID 5060 wrote to memory of 1800 5060 cmd.exe 94 PID 5060 wrote to memory of 1800 5060 cmd.exe 94 PID 2064 wrote to memory of 3152 2064 iexplore.exe 95 PID 2064 wrote to memory of 3152 2064 iexplore.exe 95 PID 2064 wrote to memory of 3152 2064 iexplore.exe 95 PID 940 wrote to memory of 2872 940 cmd.exe 97 PID 940 wrote to memory of 2872 940 cmd.exe 97 PID 940 wrote to memory of 2872 940 cmd.exe 97 PID 2872 wrote to memory of 3528 2872 inlAA7A.tmp 99 PID 2872 wrote to memory of 3528 2872 inlAA7A.tmp 99 PID 2872 wrote to memory of 3528 2872 inlAA7A.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\308ea46860359471e73b20cee6ec5bc9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\inlAA7A.tmpC:\Users\Admin\AppData\Local\Temp\inlAA7A.tmp amd-k5p4g.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlAA7A.tmp > nul4⤵PID:3528
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:1800
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.92mh.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\308EA4~1.EXE > nul2⤵PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
740B
MD5ccaa7c730a1bb9071541f23a1633f0d5
SHA103629afc114a530b8ff10673dff9038937f94795
SHA2567100c1093ca97dbdeda564649422c57e545450140fa20fd834ea774c0fd012b7
SHA5125e58f2701f6b271eac2b0f4ae0c31665284f23b57f3ad2181b9dfae53066843d6de67d58c9a8a1506b10ed7f77e4bdfcc551b4a517fc2a525ed590025934fa74
-
Filesize
59B
MD5046795c10bde2960cfa3b54f6ad7744d
SHA14339767bc990bf3dc03a07f5c6dc12154a1aec86
SHA25644e4db40f07ef1216b581826635e32534c9102b53d8719f672341a22938a2dbd
SHA5121eab479324599435fe5f163f3a8cbd5bbc93747c45eebcd0268cd254322bcea331ebc56a8ad0f7847a7969818b3493a8cf53b3aeb7ba0c7946799da3940305b5
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
154B
MD58d681a59ea75e91f730bd9ce3c42e514
SHA19d426029daeebf03c9053761e0e5a9f447f98e9c
SHA256afd3d42faa66d6703a32f2f5b41e0d679dd8210aacb284d1e46854207087cac7
SHA512ffece212187fb127e98a612a59e7f2df7e9ebc6fee600644e2eef80d62fcc7d411ffba435b48981c4d75ba0ca34f85ff57091f4098104651710220a28a13ba8d
-
Filesize
155B
MD55a17106c27138df10448c2c3be95f399
SHA156acc2ed4fea4171127a13dcdee08bdd39d674d6
SHA256c544ab13bd785ea3d5792873dedb102e87ea9a3b28fb1283be2eaac363ce360c
SHA5121d8839f36323dfb4458745dbf31a98bc676121db3e4ccda59ca8e177437c85a5811125119fbfa3b5bcde6c2fbf25ae910109e785e276c32fbfebe6437aea8198
-
Filesize
156B
MD58a275b261afcc166671132b6f03831e4
SHA103ac21edc1de2df748ee3a301a6b3de989c423c3
SHA2560296e167f4cfe36275cf1a705a6c56b30b15c0712ec5904b4ed3299f07beee8e
SHA512269cf3d57201d9c390cef3a8e74d63036d300ff464d20b419324d4575c04e004655179ac29da5e3b2b52a5e2b6f37ecbf6e512fa0c2c5d5af0c5a359af51d739
-
Filesize
158B
MD5d645085ab92574a2a17abd323415dde5
SHA149ebaa4499cacd9256f270f35f31684b7cd195b1
SHA25641ef37f97f886f32ec9e4d9ebf58079442d8bc8b102e9487de2f3f7da36e8058
SHA512a726352ef7725eb8f94609dc3b80b5314387416513e654487e6a0b96bab922412b15bfbc07f1643bc104543be7c4c8a1b1472374d8cfe7fa9a010d28a135d654
-
Filesize
157B
MD5993f72a439a3301caeb969c7faa7a8b9
SHA1176244349a0463cd0fc38cad426d89dc3b055311
SHA256b7ea84a9d48f22c799c3c3b96f29f0ae7c1b274e6402d6fbadae31fc053f2140
SHA512c373b12c16c65e966593990019b3a2fd96f703820976835c7ab3d042a997f617f49c1b5110e77833a18b3d2a2bef8fd3a97e77ea05dd7cdce9053840398320d8
-
Filesize
168KB
MD5c715e44433fde1a1835ab89023645c7f
SHA15c7bcbe69e907ed11e0e10b9816391c43afe50b5
SHA256f47cc0dcc5270b6fd8d2a7f8af9ef190fa9cf5a3e66beb68ef5d63a83d6d44c7
SHA5125393c8288186637b09c41818b4dd1eac2d6c5077dbddd40d7c68b128d2346746c1f0c50a7bf74cba05e132dca74a6025dc60512e565026c067da7140ec7b4bbe
-
Filesize
478B
MD5014cbee9a56b715b40bf1f4f138a98f8
SHA11cface858e3fa5ab70aa475643e02f9bf4631f79
SHA25656d7c37ccf304bb7c28297e70673c8ac5033d98df1bd4b943ae3473cb030398c
SHA51289e3a135a65a79473d13bc1ef868be5f972caa68c4eac62a82b84de40df0e0fd7c1849c890a2b9be9f1f108877de630c65cdcd07335daf47b48be869c5f0ae60
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0