Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe
-
Size
97KB
-
MD5
3913662273f772a4ce03418e7181d9b8
-
SHA1
1979ec4910157e5fead80c69921310656bff26e9
-
SHA256
22ec2cb81f79aedaf443f39c5464844d15e2f0bcf91e5593e626780292c9ef6e
-
SHA512
92651e0ec4af6db07ed34436a1332d3a6baf128cf2835ab93e254d5e9c16ba85d685e5179dd373cae6ddd9984d91034854c6bbcb686a9ce9525038482b7d7a6a
-
SSDEEP
3072:+BsloY2bHpGfZSd0BWjrryobXCwuwuwuwuwuwuwuwuwuwD:AsloY2bJGf4d0GvbXf
Malware Config
Signatures
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 2008 Tilecom32.com 1072 Tilecom32.com 680 Tilecom32.com 2732 Tilecom32.com 1492 Tilecom32.com 2520 Tilecom32.com 2752 Tilecom32.com 972 Tilecom32.com 2820 Tilecom32.com 2028 Tilecom32.com -
Loads dropped DLL 20 IoCs
pid Process 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 2008 Tilecom32.com 2008 Tilecom32.com 1072 Tilecom32.com 1072 Tilecom32.com 680 Tilecom32.com 680 Tilecom32.com 2732 Tilecom32.com 2732 Tilecom32.com 1492 Tilecom32.com 1492 Tilecom32.com 2520 Tilecom32.com 2520 Tilecom32.com 2752 Tilecom32.com 2752 Tilecom32.com 972 Tilecom32.com 972 Tilecom32.com 2820 Tilecom32.com 2820 Tilecom32.com -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File opened for modification C:\Windows\SysWOW64\Tilecom32.com Tilecom32.com File created C:\Windows\SysWOW64\Tilecom32.com 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe -
Runs .reg file with regedit 10 IoCs
pid Process 2120 regedit.exe 2412 regedit.exe 2212 regedit.exe 2388 regedit.exe 1936 regedit.exe 444 regedit.exe 1968 regedit.exe 1456 regedit.exe 3060 regedit.exe 800 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2940 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2940 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2940 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2940 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 30 PID 2940 wrote to memory of 800 2940 cmd.exe 31 PID 2940 wrote to memory of 800 2940 cmd.exe 31 PID 2940 wrote to memory of 800 2940 cmd.exe 31 PID 2940 wrote to memory of 800 2940 cmd.exe 31 PID 1512 wrote to memory of 2008 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 32 PID 1512 wrote to memory of 2008 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 32 PID 1512 wrote to memory of 2008 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 32 PID 1512 wrote to memory of 2008 1512 3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe 32 PID 2008 wrote to memory of 1072 2008 Tilecom32.com 34 PID 2008 wrote to memory of 1072 2008 Tilecom32.com 34 PID 2008 wrote to memory of 1072 2008 Tilecom32.com 34 PID 2008 wrote to memory of 1072 2008 Tilecom32.com 34 PID 1072 wrote to memory of 1916 1072 Tilecom32.com 35 PID 1072 wrote to memory of 1916 1072 Tilecom32.com 35 PID 1072 wrote to memory of 1916 1072 Tilecom32.com 35 PID 1072 wrote to memory of 1916 1072 Tilecom32.com 35 PID 1916 wrote to memory of 1968 1916 cmd.exe 36 PID 1916 wrote to memory of 1968 1916 cmd.exe 36 PID 1916 wrote to memory of 1968 1916 cmd.exe 36 PID 1916 wrote to memory of 1968 1916 cmd.exe 36 PID 1072 wrote to memory of 680 1072 Tilecom32.com 37 PID 1072 wrote to memory of 680 1072 Tilecom32.com 37 PID 1072 wrote to memory of 680 1072 Tilecom32.com 37 PID 1072 wrote to memory of 680 1072 Tilecom32.com 37 PID 680 wrote to memory of 2736 680 Tilecom32.com 38 PID 680 wrote to memory of 2736 680 Tilecom32.com 38 PID 680 wrote to memory of 2736 680 Tilecom32.com 38 PID 680 wrote to memory of 2736 680 Tilecom32.com 38 PID 2736 wrote to memory of 2120 2736 cmd.exe 39 PID 2736 wrote to memory of 2120 2736 cmd.exe 39 PID 2736 wrote to memory of 2120 2736 cmd.exe 39 PID 2736 wrote to memory of 2120 2736 cmd.exe 39 PID 680 wrote to memory of 2732 680 Tilecom32.com 40 PID 680 wrote to memory of 2732 680 Tilecom32.com 40 PID 680 wrote to memory of 2732 680 Tilecom32.com 40 PID 680 wrote to memory of 2732 680 Tilecom32.com 40 PID 2732 wrote to memory of 2604 2732 Tilecom32.com 41 PID 2732 wrote to memory of 2604 2732 Tilecom32.com 41 PID 2732 wrote to memory of 2604 2732 Tilecom32.com 41 PID 2732 wrote to memory of 2604 2732 Tilecom32.com 41 PID 2604 wrote to memory of 2412 2604 cmd.exe 42 PID 2604 wrote to memory of 2412 2604 cmd.exe 42 PID 2604 wrote to memory of 2412 2604 cmd.exe 42 PID 2604 wrote to memory of 2412 2604 cmd.exe 42 PID 2732 wrote to memory of 1492 2732 Tilecom32.com 43 PID 2732 wrote to memory of 1492 2732 Tilecom32.com 43 PID 2732 wrote to memory of 1492 2732 Tilecom32.com 43 PID 2732 wrote to memory of 1492 2732 Tilecom32.com 43 PID 1492 wrote to memory of 1864 1492 Tilecom32.com 44 PID 1492 wrote to memory of 1864 1492 Tilecom32.com 44 PID 1492 wrote to memory of 1864 1492 Tilecom32.com 44 PID 1492 wrote to memory of 1864 1492 Tilecom32.com 44 PID 1864 wrote to memory of 2212 1864 cmd.exe 45 PID 1864 wrote to memory of 2212 1864 cmd.exe 45 PID 1864 wrote to memory of 2212 1864 cmd.exe 45 PID 1864 wrote to memory of 2212 1864 cmd.exe 45 PID 1492 wrote to memory of 2520 1492 Tilecom32.com 46 PID 1492 wrote to memory of 2520 1492 Tilecom32.com 46 PID 1492 wrote to memory of 2520 1492 Tilecom32.com 46 PID 1492 wrote to memory of 2520 1492 Tilecom32.com 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- Runs .reg file with regedit
PID:800
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 492 "C:\Users\Admin\AppData\Local\Temp\3913662273f772a4ce03418e7181d9b8_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 520 "C:\Windows\SysWOW64\Tilecom32.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat4⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- Runs .reg file with regedit
PID:1968
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 540 "C:\Windows\SysWOW64\Tilecom32.com"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- Runs .reg file with regedit
PID:2120
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 544 "C:\Windows\SysWOW64\Tilecom32.com"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- Runs .reg file with regedit
PID:2412
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 548 "C:\Windows\SysWOW64\Tilecom32.com"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:2212
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 552 "C:\Windows\SysWOW64\Tilecom32.com"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵PID:2272
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- Runs .reg file with regedit
PID:1456
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 556 "C:\Windows\SysWOW64\Tilecom32.com"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵PID:976
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- Runs .reg file with regedit
PID:2388
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 560 "C:\Windows\SysWOW64\Tilecom32.com"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵PID:2084
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- Runs .reg file with regedit
PID:1936
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 564 "C:\Windows\SysWOW64\Tilecom32.com"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵PID:1760
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- Runs .reg file with regedit
PID:444
-
-
-
C:\Windows\SysWOW64\Tilecom32.comC:\Windows\system32\Tilecom32.com 568 "C:\Windows\SysWOW64\Tilecom32.com"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵PID:1312
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- Runs .reg file with regedit
PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942B
MD54cee92ad10b11dbf325a40c64ff7d745
SHA1b395313d0e979fede2261f8cc558fcebfefcae33
SHA256eaeac48f16abac608c9bb5b8d0d363b2ca27708b262c1de41ab0f163c39a2fb1
SHA5123f11992b0c8f7c6f0180f984392f86ea8eb1859be236e2bbfbc863226d3cac67b06700561f27fb673e2955c6ebc5b168dd28ca704de57c4f6c07bdbf14f75ec9
-
Filesize
574B
MD55020988c301a6bf0c54a293ddf64837c
SHA15b65e689a2988b9a739d53565b2a847f20d70f09
SHA256a123ebc1fac86713cdd7c4a511e022783a581ea02ba65ea18360555706ae5f2d
SHA512921a07597f8c82c65c675f5b09a2552c7e2e8c65c8df59eebbe9aff0bfe439ad93f5efc97ba521be31299323051d61ead6a3f0be27302dc0f728b7a844fb2fcf
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
925B
MD50d1e5715cf04d212bcd7c9dea5f7ab72
SHA1a8add44bf542e4d22260a13de6a35704fb7f3bfb
SHA2565d1fc763bce7a43e9e47a75ddb116b7e5d077cc5541c55bc06f2951105b88473
SHA51289da5156b2021e4279d7fb8e3bf0196495f84d9aa04c921533d609f02b1b3edd29de80d5930483b914fe82f5fc319993f7fcd925ca22351fccd56c82652f2117
-
Filesize
1KB
MD5b99b0dc7cab4e69d365783a5c4273a83
SHA15fcc44aa2631c923e9961266a2e0dbeaaabe84da
SHA2561fc967a5c8f7859ba0c410978d165085f241195fe4a31d61a127e38c30d435e4
SHA512495474416f5eccd40829d42f050464903273d564cb862b1bd0657262485e634b5d466363cac085406c6d830f42a2f7b5648818b2efe6db1a90833a4b90a6a14d
-
Filesize
206B
MD52d9f1ff716273d19e3f0d10a3cd8736f
SHA1b4ca02834dd3f3489c5088d2157279d2be90f5ff
SHA2569acf0b6f653d189bcf02fa9941a2a1a6b6f60c6fa1f62ad38f314014ec188623
SHA5121d08e079d12a58115ced67c002d383a4ff5aca81fde9ac81bb14d8c5dcdfe07839c7b895130b746d4691cd38dc74fbfc0bdc8605b520ac85bc137fd5fa922025
-
Filesize
683B
MD56fe56f6715b4c328bc5b2b35cb51c7e1
SHA18f4c2a2e2704c52fd6f01d9c58e4c7d843d69cc3
SHA2560686dfa785bc9687be1a2bb42ef6c2e805a03f62b4af6c83bac7031e515189be
SHA5128a19ba3f6e5678e92a6fd92a84f077e851a53a71a02622d87d5213a79f40540c7bbda17219f9349387e94edc75eb12fd2cb93e3b0abbcf9a85fc7d5e8bf3be0d
-
Filesize
2KB
MD55855edf3afa67e11de78af0389880d18
SHA1c43fcd36d70a6ffcd41fbb48c1d0c406fd00286f
SHA256c7798759a159989611cdf47f702c8813ad0f029b52f18af573f383859a8bfaaa
SHA5125be99a55f86486c04bda0a089571c296d041dae337321578c0f8d19d7bd2e51802aafbc8716753b6191b8e5ced782a5bc7d44bdd4995ab8e6ac1f7cd4b0f91ee
-
Filesize
1KB
MD5748bce4dacebbbd388af154a1df22078
SHA10eeeb108678f819cd437d53b927feedf36aabc64
SHA2561585c9ef77c37c064003bd746cd0a8da2523c99a10c3fb6eabd546e2a343646a
SHA512d9756851b4aa1108416b7a77f0c6b84b599d695850d704a094a1f83b322d892ab6706001d5322e876b93935b830bcb52a951b4c69004ea2be338f64b85be2ea1
-
Filesize
2KB
MD5294976e85ad11a45853f99c1b208723f
SHA18d83101d69420b5af97ec517165d849d3ab498fc
SHA25604fe02d621f3d9853840b27476da4a191fc91592a77632f9cf85d4ef0370acff
SHA512e8193036e0e411afe75c1e23f9ce1a7f32d1297706cdd0d99c20375dd7a2bdfb23cc550015852f36816668f0d085042afe74fcfff294f90854ea70f3b929a9d6
-
Filesize
110B
MD5b6b8b04c60361e2df1d3e29fc4fc3138
SHA1bd732238f8d5894ca6020081adef617dabadf94e
SHA256f255a5447d3a3eda8715938993357971faeabf92eecf172e2fc0dfbdaa239c1b
SHA51216e7247fdc0c1191229ea44b4f6584dce588255e775642c343cffb2030c05bd77f4eb716d87d21defb0fe7edcc62a7a2e12ecbebbd72bc9a5247934fdd02fe40
-
Filesize
97KB
MD53913662273f772a4ce03418e7181d9b8
SHA11979ec4910157e5fead80c69921310656bff26e9
SHA25622ec2cb81f79aedaf443f39c5464844d15e2f0bcf91e5593e626780292c9ef6e
SHA51292651e0ec4af6db07ed34436a1332d3a6baf128cf2835ab93e254d5e9c16ba85d685e5179dd373cae6ddd9984d91034854c6bbcb686a9ce9525038482b7d7a6a
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904