Analysis
-
max time kernel
138s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe
-
Size
68KB
-
MD5
5acef71913386b1797fac9c2a20b1586
-
SHA1
ddee4ecd39971b4336e7689659c60230e2f58991
-
SHA256
b64e5578b24096c6592ee7fbba2661af69397d10fd65317a2cdd1e59fce39235
-
SHA512
8efba606622a297646f83219b186976a82e4c06a5de2ed455d28576dfa0ae04bcdee11a60027abf546fb4f622ec6d6a7302553116f26dcc914c9852f49fe09d7
-
SSDEEP
1536:dtq94r/A7amvIThkLZsRwYSpRPMwPgAa8n/6OVFrTP6m:FTwIu1sqzVPJNn/6O/f
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\llajyn_df = "C:\\Windows\\system\\lljyn081204.exe" 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system\lljyn081204.exe 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe File opened for modification C:\Windows\system\lljyn081204.exe 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe File opened for modification C:\Windows\system\llbjyn32bb.dll 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe File created C:\Windows\system\llbjyn32bb.dll 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427532267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB91EA71-4597-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2624 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe Token: SeDebugPrivilege 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe Token: SeDebugPrivilege 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe Token: SeDebugPrivilege 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1060 iexplore.exe 1060 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1060 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 30 PID 2000 wrote to memory of 1060 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 30 PID 2000 wrote to memory of 1060 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 30 PID 2000 wrote to memory of 1060 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 30 PID 1060 wrote to memory of 1864 1060 iexplore.exe 31 PID 1060 wrote to memory of 1864 1060 iexplore.exe 31 PID 1060 wrote to memory of 1864 1060 iexplore.exe 31 PID 1060 wrote to memory of 1864 1060 iexplore.exe 31 PID 2000 wrote to memory of 1060 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2912 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 33 PID 2000 wrote to memory of 2912 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 33 PID 2000 wrote to memory of 2912 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 33 PID 2000 wrote to memory of 2912 2000 5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe 33 PID 2912 wrote to memory of 2624 2912 cmd.exe 35 PID 2912 wrote to memory of 2624 2912 cmd.exe 35 PID 2912 wrote to memory of 2624 2912 cmd.exe 35 PID 2912 wrote to memory of 2624 2912 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\dfDelmlljy.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e89a2fc783e57dfb90d5c2d5de6957a
SHA14dee7f58da9dfd2ff1ad5317f2866d8dd3973769
SHA256b4a74b90f32bb53e519bbd374ff004e57df8839efec9b037ab00913f9c00dc1b
SHA5126f8b59a69942978d8eab60864773d06a47170449685f368d7972c950c911029b3d8458148b6ee69911b63cea5109749ca397ea531392869db4399259fceb3c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ef78c557310c71bb8462fe3fe9fb0f
SHA141ad477feeecb88e5110a4cf9e556c6141279d02
SHA256938ffc50bc38aefec20b9a5072cd2b5f6c967aada9fb28cc6501d760fcc562e4
SHA512944633d45bed961aba66ed72ba91dc1ae232f1492fd37f19648dd1811230cba66368db6a7791a727335eb102cdd7887633efdfacb20e0a00a9c0543a98905937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fd41800390c2fd16f47a528911f3b8
SHA122f59168364895c21486f156c52d5090da72686b
SHA2568da8b7b80c7858b6605cfea8de397dfec4984ad3966ecbc799d4c981b4bc3eb7
SHA512485a41f673d8ef44e030f78df1e8266dc6edd2bf3750da69d54b2bd710336b2d3f4d1cfb2a24e2480c8ec6f5658f3b0318b38a11db3c8e359e56186d818b3c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cd35a2df67d88308e4b4247ddadf7c
SHA1cdb7b80b8cb23ff844f105eed25e6bd72134bec3
SHA256e89a103fbf961683f756bd8c2c657dd649c72199e53a9566055a9678129097f1
SHA512b2cf2930b550d312004743d5affb23ad3eaa6053aae94348c767bc2dd78b9e182bcb048cd4db65688432f58e17646774514793a5f8070e18ec104da73f7c75a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fe1513c8fcb930c8520cfb87c0f5ba
SHA1e29b5f55bb1871b4a2e17e1c47bf38cc3e58e058
SHA2561c10aa4aafa9a1ef16c8225e335a6c1b77062f97b035161a98725c8ae2f0f37c
SHA51231364e7d1c0f4fdb3a52cd602b546b674b42c2d7ac730fd934b8d6d41cacbe9f3ad1f3d1ef5c085c3a31fa6668837bfe00f8e6c40d36fa7021a0bdddd5a9cf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6974b100995770998e3f1275cb6bc04
SHA140aa7b9426cc2212b94c9a1876aa117c7467d017
SHA256cd46e885408b2476a2a495583378c98b33eb0180a0d299013f3cd6d3acdfd6b2
SHA5122a41598175a8305d10e5853623d5530ee3a03c27ea71d7dcf122f8a1fe34e5a4f30312c55ba03581a9eaf8404c899d0993c23aec19f5bce68e882476d817f713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48349cea1fe9ec310f340fff4d08df3
SHA13b730b687e30075a83b3b86049f28d07ebabbefa
SHA25617bdc715e90fd8db2037ba162c2408f9880f42ea4375e2678bbc368774b1a40c
SHA51265034dda1f1003a6ee84a52d419c429cc893cb6a93ecd4b2f48681329a46973683cf4c494061894e90c22450768ee649af07bfa72d9c985234ddb814c8fdcb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a634654604858cd85f5ee66f1eeab475
SHA1732384e7825f6ef1c72e6a2f79ab58d93b37a19b
SHA25675345c650879bf8e45f9da791b481ffc2aa5bb0963cb8cce0dc4d2fc4dfafd37
SHA51238c62a18497824130b6729e24dcfdf2a6b2665de3601194c336af74736d41639ef0aea485bc22a14becd46724ad3e7018ba3dc974f2ce675ed7936ef1ad5c889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92e75b3bc23eb1b7bf809f8ed90b9cb
SHA10d95d979cb23e76226cfc48295fcd3370af5f6d4
SHA256f069b869511d9a2edf96c0ab92a354f299eef718a8a37e6e38840abc4e4691d0
SHA51232f3f4bbcd32adcced0c05e168ac26007125756843cdf539e7f7a5abb3de47bf033a53497633229bf52ff8fd39280a4717dfd9546298b36cf8bf9226fe850f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a82f3d56e162092303009d8e610b344
SHA162b316f94017ace48f84cb03c591b338b579a69b
SHA2563ecfbe1b26da60b44f885d4409e97c5d36c4984fcba839acb69b7ebccae771d8
SHA5123fc9e761f4dd1948d0b575941080df24eeb79f78022187eba75a502bee073d9c6b52bc8809698a6c5a4061b65deb48d290b26a6f82e59f62050cc66799436245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515825311a02b90c89e638f792a898c5
SHA1f43b84b2306ed3e5a0afcfd19a40aef12018f73a
SHA256169a43954ef01459c5627d605157e4eeb5e2a3f763fd945b0fe2f01af28a9aaf
SHA512bed8f7b0d198945370b1db9ae221abbb901e3237f9e64fcb0ba42de3512c02a75f06dab2490586bb4218f753298c3cc55488bcd24d25f23c776e93aac1dfb99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26b4a1688dc6fa940a48ea17f1dc553
SHA114d9f5afe7fd13827a84f1987b7ab2cfc234a96a
SHA2561603e5fbefbc08da9509b7d33bb4f4f1dd5d3ad0788d833be5ded00f6ef2f304
SHA51290f2c99fcd39e629ab3ea7ea2cf0919374e6bc1228f415ad8b3c66931b5a5146d0a24f08d4964028808f719348a8a4ea13cb1d18caf35ed74809a5bd17d6936d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006039a52a5871cb990b60c538ba2f41
SHA1156101ceb5d7adc2961141905a8b63bbc960ab6a
SHA256942a23d9f265173e8b5cdd909a160eac744ecda5f304875b22e8c9c6c5e264fb
SHA5123baaa3984db1f8fffd38f260f75c60846000147f111ec3d5516dfc96415c0d2641ebf949d9534e69ed1004d846004990d713ddc543964112c21fb5917abd779a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718fc2fb0f1729395c996ddc0ed205d1
SHA1024eb7a800e24ab3a55a22285709f4ad29e7be26
SHA2567313972bbd8377b30a97a9829289bdd1e968c5073e139748c37d4f1a43317664
SHA5120c0ea9c1ed1f4f08c2d5da1c73844683ce594f950cee9ed2143e43b35d7d622b27ba2b04eca573651e487a5b41fae597ce544f104d840b4ffbaadbb86621b178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c2b82d56dee08dd14296396f0db3da
SHA18e0bf55d245fc0d11681d37ae99f986b48b284a6
SHA256a79fd42af5c430eeac1855d61f9ffb09d7f8fa3e43e0295b3ebe267a149e4241
SHA512d6ca9a23121828d8a44e39d74b6f667096725e22b8778fdcc87cf1f6ec9ed5e5d5d1ca1a027e409c1868f52892951f457b385979d4c525aa5f0470382821c411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678b78fc5e890f905fe221035e413d54
SHA1ce59fa0398e27f8fbf73c82e6d594fa3f0444f77
SHA256045c4d06c2783eb19bc16fa37ab061fdf5c7e9fd2604784448558b248e4dc0f4
SHA512d9e1c12703edcf404597817755b7555adb44e509c7936ae609f090ac3cc101dc508b0141835f829829c7c8b8992fc97bfb854c17a5dba27cc572fa5efd5e9342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da51921d2dde40be4deb7c6870790d56
SHA10f17e2092a5fd29516c24c5f011b288cbecc6546
SHA2564bee909461e9d081d215283641474831f252f3fd8b09344041edc984997e5b5c
SHA51290482f05b4c94d42cb87139be190daca6a5df6c58c32516260144207b356e92d934d8ad3215048758d81a2dc13ab5b05621d65fb98371f0842bab16b7f105ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535076607b75512b5320f3af9a920e015
SHA1430bd4eea162f38e195598ad2ab4e41f81c93e96
SHA25687c2e969d38286170b23285c85f5d544a9ba0f675313efbdbdedb92b91bc1267
SHA51249fcaba52a82c2d94d2bcb96d9c53d26aef49e61991a3d3f7f2bef4b60869d74ae6e431e41a8e1cc9ad1f73fe58bf36261f7420070b73ad6ac6b786c6fce8d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6aab654e751d9f73dea1bfabe3453d1
SHA189e7b9525106435d47551b90bb1392e08bbf21cf
SHA256f7e7b83dd16f6246790c4c1b115c8983bba415852314d3fbbfbd59dcdacb96d8
SHA512e38c408ee3318be3e49995f876fe9ba7bda73bf25e8aa82eeba1035f52d35212121b77122399a5f9c36b510fe97ee78dd1f49954a19efa8e71658cdcc8a7d64b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
233B
MD53f31324cf9515e99e6ba1ebcb64ad70d
SHA18501c93b46d9c02c7f58122107fc770dcb9e5737
SHA25603be84b09f53f903208bffd7ff20007f736fc9fb84628554d03e3227642ae6c1
SHA512d016449b583a889762f0427222dbd1e6f88098c63b2ab7dc5d554e1fb33ce977feae1e583378cdc97c11bf6a1a45e81aef67eed27a48de324030d2f9cbc607ca