Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 15:48
Behavioral task
behavioral1
Sample
35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe
-
Size
191KB
-
MD5
35606abba33be9f2e090976ade99d93f
-
SHA1
c7dd57559d7ff11bd24b80adf80faf836cf19f41
-
SHA256
9dd516972713f4ca96d640c39a9eda14007dd3336242b4bf8203a0b9328df006
-
SHA512
58194391ff8542d64388a3f576becd4f27612954e08cdb06e0cf5bbab40b0aba621b28912cafc32e8d311e25feabc6abd09590de7e194de1f3a19de50f283492
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vJ:PWfUkBPyrtBxgQTMK0TKpxS3H8j0b0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/3032-447-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f718aee0d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426788376" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000086ba252a4cb07534e3915fcac7ced8a48cd0286338a3f7eadf697e49821ebeb0000000000e8000000002000020000000e1111d6f5f4aedbdd7c94e25d85b9281b2982d785adecc835db6583a6a1337e8200000005b02d65cb0ce65dcac3cfda84e89250ebc818bcb7d3a27796be6ed271f18f74f40000000c1dd48141e465505f6f7196417cdb2e992b4c13e7b7d8a3d9467d040606d21144e2890a76f89b68d6b1254429eb121cd387fd7db89e351707e9c7ec7ccf32fde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D96D20E1-3ED3-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 2544 iexplore.exe 2544 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2544 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2544 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2544 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2544 3032 35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2444 2544 iexplore.exe 31 PID 2544 wrote to memory of 2444 2544 iexplore.exe 31 PID 2544 wrote to memory of 2444 2544 iexplore.exe 31 PID 2544 wrote to memory of 2444 2544 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35606abba33be9f2e090976ade99d93f_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/1059/virtualvillagers/download.html?afcode=af628d3a27a22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193e37efa34445d067a7c75e84051a91
SHA1d97b4a156293888988b44b5affea9860ba35fa80
SHA256d68ae37410be7a3957cf47e11b92e8078bc0e49a37be7703ed7cb613761c61db
SHA512968d1727f544af5ee8201d4a2a7c14aeb875a11dcc1cb085d3c984799531b04261a8b33fea767bf84cf242bfd484330a02caa7cd04180bd64f176c547adfd78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476e21ddf231603b4668e31f526efd2f
SHA19524e5e3cb8f22a6c90e9776f85d75602413ccfe
SHA2561c10175f4be63c10efbce895db3f3eefb8cfd8ead45996bb4d80a4347a9457e4
SHA512c20af7e389ce3d924cc676af7dbbc6faad39d355caf372c2831ddd49f96d4d20f16875c599d32786ffeee5bd193871d865c08e4e6bce8a5fbbcc3499b8a81daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d02ec325fbfc756c820e2d893e6e1fb
SHA19137913b82745c16ea171f6416e2cecdfb08a237
SHA256ea9da5e2219da9c1fdc1055c9066e4f9ba9e557e24074721c7518341cd53d740
SHA5124ee78945594b75969642c6b4e19e7595b23183151c49ed6b9a38ce6031ac6cc2d67dc3e30549b76cac72309279d5713b3ae955f4b5c2d6e655a0610b8f6cb056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56420f47e3368e76d479d4dcbdebee485
SHA138d644d3f9dc26d38337b0917a2de0069286a331
SHA256e4a4d3901c98ac3d79dce3c5a551bf4ebb7f049ee43f354b9c8415a4b1c415fd
SHA5127c05ef62efa2024ce50db09349fd44649e75969e62c43535b885cddff9151452e8b44763c6552a0132ab1f57df698eb787aeb52caa7dde0c42d0873ae5e9e504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59259cbcc828d0bbbfe49ba478fa6feac
SHA11f43461a357276ce03399de23a809cda1da0ac3b
SHA256c2e4df98d5893d89c2f3fb41b40cdae012a4b41b0258a742f0ab395f12a4a12e
SHA5125cf2d99840b8a8dc3d6d5854cb00599b324527a5c81827a8cc85b8d0944eb20e2bfa8a9e3ca5aeabb9a79a4a14692bc07c3e7c033a707704b4944c80d973b26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee6387965833b2d41cbc8c0340cabe9
SHA1fe24e94e0cd6b465187553c4b26f71193f6bb3ea
SHA2564966da8cbf4f7709e9ed75d83563c897bddee7a79fc67ec7cc42f588598832c9
SHA512d9a4d9807ed002f5ed6770465a0ad765a638500a5810f352247a6d6dcc70c08c5d77e30dd4b4e8f0b11fc1dfdde3832f0e7706c40ab1c808d42851c45de97574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d890991957f59a497d1fa62e2e5eff
SHA1bf0ed4c7adac3416b63e723242743f3c079cfec5
SHA256493a2bfade7130a7df1faeba5a2eb58132140b869d2900ee72a8c9b1f7907b62
SHA51253006e2c16855fc0b4a064388f8b09a69c752eab4c6842624920e5afe76bf276ae4b19eedf8e5deb81d289b1c29f83c0467539ccd7403d29feed19708b06ea5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83c621a18c026cf3361c37c0768208a
SHA1c431ebf8e7f1fd94fd143e3e09947756f365eb54
SHA25685147a5fb7d198ca837ca64f33ad8691a97c437fb03fc74e1cf3ac249b186199
SHA5120b5f87e2ca0902e9fe603e9af18abc4b932764b380759fd7b84bba960a06084636a4da0226484d6a63cd9eb3278fe9c68e8b9a74975420b8dfe9823483afbf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbc3095ad077696e79dbddf5dbb3c5b
SHA1b8def42b2636e59b6f784cbca53a708476cf9776
SHA25681017f77b6ed71436f9831a16901b6b2140a1c42a0da661c5944c94155d1b835
SHA512b7ec6524fcc25edd772812c432bc30e2c3463adb42b73f2a669f4d3a087bdf6f2ea3799b6aaa8d96370602f1e3c244c1b64d1ec5d51106565d76e3bd52837944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caeb5c5db827241096de0c0f0b2d833e
SHA127ff096becbacec37e18853634693d8b11e028b7
SHA256b25dd6ffe526045e29d0e21087e840e0d553a9099f0c640088524003be7aa010
SHA51204a9ecec9b3697749a8e987da0fa0f7ba6cc931f4abf39eed9cec6f2ded29aa6d2939d844a3ca14264840dad001853631629eeaf3f8c07cd16ad0fe4dde3ff0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56debd2a895e5005005a4b64c0b07f4
SHA13fa28aadd8346b4ab3f4a7d3db9306cf65a120f6
SHA25608934e58cdaa1804fd28c254720e43e5023cce6d21e46ea11e2401412cc0156d
SHA512ac67fdd402d5884b328beddfccbdff032923bd0417a3dffe2dd147693132841e6c762e4d5d6df625f0b5e97ed5d295c87756e9e2fc71298f82ff0c0f3e5e22d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ba7ad2f10731a8c8a769eb37cc7d87
SHA1b5bb1a70158cfc316cec4643b2daa457127f00c2
SHA256b5d63ef932093f26d1bf02f3c8a4c41127f3b40894175706234eda2f2788e3e7
SHA512200a32c069f553304610233055f4e57560de4e375a3936f5c15ce030741f252fa1c31c90605e48b04e291313e20bde89e8d9e7a8b13cf391fb8da57392031d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50596e6233f85fbda08b037fedf1f9260
SHA1be712c85242951855aceb6e69ca65ae63732d9f4
SHA25601197077758f1a0375ba89e4247196147d6749aadbb6e2bc59d03c3bd0b20a2a
SHA512df7f965e068be6cf2fc7c048107d251a266d13cd303e47d0cb5a91fcf3e51a06b7be14de63a23ed0ad783d37775877ced105e41fb65e00a64ac425f56fec0604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70628fc6dd0a5780c677745df689bcc
SHA128ebd54fade86e4611470b6a5087e3320d664144
SHA256cf3279f54368916c50f23e904d58fa6a8cc11595998b75863f8f5b235b5752b8
SHA5120d7c7706c796179c202d3b9533e189f7cc05793effa3f389ee2dc4f571834c64c67005c0ef1c1fa3989965cbbda17ce276a51eb228650e865f9c29312a4f3233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfa71d47ac8e94bbefa5f699db9eb74
SHA1df6b634bb00a9adfd371a2454323ffbe58af978d
SHA2567575ca2cc1f5b0d1af59bc3c53223a891d7f72d6257fa147dacbf1a60bb13fc5
SHA5126999874a00c5cc3f4bbffc10599f4747f492a774bc93c6f3f4efa347767499297e8d8a86a65d4b0bc24fc7cfa982a5dfe908ce3478322a5e1ef68dcaf192a151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1575597851e26211b60cfabccb0d582
SHA1b8dceeead71da593abe07b0e79f08a76775c1f89
SHA256f6aca2bb4322b85358c9be8f694feff7bed32afc3334ee5bac2857cfe300cdf7
SHA5127508d27aafc9e542027171c31cd697c8e135491ce4faa5b697cfab6a9240bd2748095ec15cd9ed336efc3a232f5900fb77e3166ca95c0646cff06b1814b787a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520788ae01173a28570f05889731aa7fe
SHA1eae9705dd019499d0c8e1200e367ee20f3861087
SHA256b2ee2ed14764f8f8e0d219e56fdd90d912ca507276508244f0e64b9f82901e97
SHA512d4df15bc4c945ca3248d39db7752df5fa58a8b7918aa9ee6e73a5bf1ff69fed4e563abc67b40502301f5b2fed01f8e8b832689f89d4c4f25ff182b4bb14982a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599023f86d6b18346b05b8f72fbc833ab
SHA175a213efff973e727f031ce9959e2ae7bb01520e
SHA256347dafa167dd3d4a33af39578d975fc83ca94e48474f517b968a217198d20aae
SHA512d73b02f3895ce3f9ec57aad02e7642129707009ae00441999a3e8689f88cdcdafa6ad7729051132bbabd7cff99b9ad65fbdad21a9b55c2079b54c2b73cb1cb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9f21c1dda0813785c657b82fff4ccb
SHA14815fb7fa55305f335500ff87fbcf7f50ffd3c88
SHA2568b722f17b872ac84c9422e325bf93860c0dd0bc9aeb7f64211b6387660a996c9
SHA5121cde43b4a6e17f528e27ca81ee653b33d7abf1deab55a2080942aa84555eb2567721e3e0c1232297a4f8577fc923a1d2e8ce49edfcd3cf96302c20940a592983
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b