Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe
-
Size
20KB
-
MD5
ace16ff85873a885160f83050f6a3ae6
-
SHA1
b99a49a54a733e754c1f3ba67614e148909e235f
-
SHA256
1482cb65594447df495f429888e17938fdaea50a13f273dbb5e5e681bc69a258
-
SHA512
52ffabad5a75cc621818a2765934b771334d19842e879b639cb279b9ca879fce9127eabc7c2872617e99b113c50de84c4cff6eb3026bcebff984fc0b0bf64771
-
SSDEEP
192:/TYZ5GjUL+VjL2uyVDsJpO+7PX8HD9SpzEC:/TKGjUyf2u2Qpp7PXoD9SNEC
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinUpdatedata.exe ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe File created C:\Windows\SysWOW64\net.exe ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7051A041-5E7C-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d98340b0de86b673930ef1c60df1931bda83638f34c1aca8d132b0caf72efda9000000000e800000000200002000000082f3669eeab789f019e4f48af2391f36d6be48898012a2f9c37e4c74e767be6290000000d746a705aa7bf5b5b52873dceef1c091930ed3ac263bbe8e01d9bc52b7e5cad1bbc3e6da29ee6f7ac736a1078ebe5c87ff86cfaff319baad738c00876502ab6f22502adad5ecf6de919b7812fc9393a24a00045e66085432dcc224b1dc078cc6b5191f0f6252c6164f8f0b957d8f9c2150b05a154c8cc9be230db503b72f8e591aedca181e6e6560bc3c07e8dcb8ac1c400000000e77e490823420726e1ba78409d82bec457c2539d51f57ede3561815ea76e71cf63d34d665c64ecfc7f9df797684cb97b2908eb92239e97fe60693039e435f17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430269270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a1694689f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000dc192e1e496c85f7b15fb954a5bc694eacc0e7fca2d5000923c74f75d3c824c5000000000e80000000020000200000004420dd754b8559e6a4628355256e3e0d99a28f203a9d1adf78a6d1bd12799eb620000000d6bbaff02cf55bb8d2a03cac1292bc312b820e3090bcfa45bae71f62c3159f5d40000000e03aa06f6ca3bd1d1a245397f6249a2cc43cedf6bf75d43374e49d94785772ee43e22ddc7cce3734ab69c69e3413a300bfba5c5e28b6ef7e23a262a139b578e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 2252 iexplore.exe 2252 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2064 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2064 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2064 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2064 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2252 2072 explorer.exe 33 PID 2072 wrote to memory of 2252 2072 explorer.exe 33 PID 2072 wrote to memory of 2252 2072 explorer.exe 33 PID 2252 wrote to memory of 2772 2252 iexplore.exe 34 PID 2252 wrote to memory of 2772 2252 iexplore.exe 34 PID 2252 wrote to memory of 2772 2252 iexplore.exe 34 PID 2252 wrote to memory of 2772 2252 iexplore.exe 34 PID 1944 wrote to memory of 2856 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 38 PID 1944 wrote to memory of 2856 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 38 PID 1944 wrote to memory of 2856 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 38 PID 1944 wrote to memory of 2856 1944 ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe 38 PID 2856 wrote to memory of 2428 2856 net.exe 40 PID 2856 wrote to memory of 2428 2856 net.exe 40 PID 2856 wrote to memory of 2428 2856 net.exe 40 PID 2856 wrote to memory of 2428 2856 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ace16ff85873a885160f83050f6a3ae6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://get.adobe.com/br/shockwave/2⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net13⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://get.adobe.com/br/shockwave/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b0d1b076a7162bfe008da81879e9144
SHA1b03356f78b86a03cb841e7def4870df71698ed40
SHA25621568ccc0db00641e667d6efdfee4650c41cb28e4187687de76d6e4722e94309
SHA512cded9a3d024460ad52b87cbf5e520ae75106265de005950a14088aa1fdc43424c11c86b9e71b6007bfbf42b348c035d53cc5e34b86d98c35cf8f3c5f05fa64a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b552008a4d5b9dac065ef9ebd306c1df
SHA14fca10e744bd01f73c5f25cf83a545ccc9321c58
SHA2562feeb32e0b8f801825d56d93a6510e5d79e45588047e60b160e6955a6256a0a5
SHA512184d5a41f49c5d30c6469b89e514991b8f31914bdcf20c680c0899ebf92458309568716bb464ae92c2acc4517785d80bb28ba65d638134576b8e9a6522df937d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51879193e0243439db2b16a7bec7d4422
SHA1545569cea72be6cb56c68d775694bb5f84f7fc3e
SHA256b68d89cddd69cbaeb1bc877b67a0b5907d423662179daefdcc3f1da55faffa0f
SHA512c6be5a0d6fd265d9cc3761c39fe966bf17b30d59139a39b357628e60bb486cbdf42646cd5853be4e1696162a65f5970198d8bf91490f11928553b0aa0d9a4da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555ee78fc1123d145dcead00e70793de1
SHA1bfd57fd08247767d67692f9396a62fddae948d69
SHA25663933ce892c3bca49a351862c4be42d9ff99fb81099a10a852ecd271e9cd5fdb
SHA512a536e5976e767cd78f7276e409b56805821089477b053322fbff79e5ad0389c4e5145df1abac8f2bcd51cfa8d241e40128a432d44e71aaeb96116c566800bb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fe7746c054735f3321633dd3af03143
SHA1cbc7cf7c9ec2a23d91a5f188fc2755ded282a6e2
SHA2568c9b83eb7e1d5cdd0a381967229e0737803d8398c0845aa26f83f47b853b717a
SHA512c70219b8c030bbd5c13885e5e208175e2400dff579e93c8e7b15edb833bbd22fd6bbdb62c86ce69fd371958df9532bbcad96b7e6b49659ed9719f4125118ed31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a8f3c98188108c1c3f37646781616ec
SHA1ee6e3f9eb11e626284745190a2c2aca0d89067f8
SHA256c54df36ac4ceb38858de6f3e8647bc0ad130d791a0bd35df565f6e0aa3da63f6
SHA512ec9261414721dcef0a3257fd4a349acf22712379b82eb146146ecdc5bbebd76ffbdd8275790513e8d739af79c2f03edfa20b42cdd3984e3958c6c2c94cf4e0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5305ff4b5beb0c6fdf05013948f6abc6c
SHA177f3d3df9f97fb8231e6c1f16e9e82c7e79cf41b
SHA256223b8d54860a2a85ac9b389b0e06dcdaabc38776252741b2c43c8e1e4cc8bdc4
SHA5123b8cb9dc3f783350842848c69d2661feb03c20a1af15f4271bbebd62ba63303c5fb3f571f6493e1da7f44fc3c9114070ff4fd1405e33a7c3bb1d756320a493f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5adcef8d65082b417e0c03cb4b31186e7
SHA1b72ee58e292fca972dad2fb0d918f1af33b4876f
SHA256f53df8efa436709dcf863b1ae8f3edf687d56ddf3a990431226d053def3bc22e
SHA5121673da907b1d433e9ed3db92a8a4da32b0b051823c3c03b83e5a947c0113d045d41a7f02f9c0caf6b1f132998f68b4ebfb946640518970902a8c1a16137a1668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2363c318b17391d2c93701d40acf126
SHA1bb15dfe8212b7006f94b4c177642738eb0f40c9c
SHA2569eabde4d55fb395e70a5ccfeeef01dee61cee78d07d99079853d3874b8206ba3
SHA512020747a37b0515608be990446fd462d3a49221e30eb486d23b012a1d62c12657c5307570a3f9295fac725c80e27dd39ac8b4a2b3b2ff55153ea31ee6284472b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566a68a1d82294f5348e961fc409d715d
SHA17f460fcf1ae78c60fd459588bbb4380d01235e88
SHA256e5491d78f4e6afb13c418bf564a80c517e38587399557b907d4276578765773f
SHA512cffc562cd1c3434594024a28e16c870752f0df112690ba416e3783a5af4d0aca2a1ed9480c824e923c158c8ae86f216bdfff56ca05972b39eca240785eb35d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597b928b42c712c791b96ac34a5e840c3
SHA1104fc4049b6db36d1e0ee53d3844c8e31f85d1f4
SHA256b7886b04e9d50330c386c0c815a546fe0559886a164247349aa03cf7d9731620
SHA5124f5047df78e5f130fed384f41a089ed22a543c34213ba358b9b692b7386d3c50fdb5d32dbe66febc2574467fdf13a6a1c1db98cdf1572364f927605357dc1d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d97e3669c3b29417b24d349c749b148f
SHA1b565eced517aa0c6e6af5aa921a808b494d8a7b3
SHA2567ba3b6f0c57168a53af006d881c2a65e88a93e58ef4adc5fa84593caa7e421ad
SHA5123c85aa03a1a2c8c3a00ab2890e98b9f1435bfa9f8a1b541cf0364ec766ff761723c8d7e281c32d1d1204360e99d119197ca778bec126aded86667b13066adc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57335150025d6324d9735c45a14d76d45
SHA1aea765a1306c993e8f1b0fed96c91cf7b2b840c7
SHA256b902a8223ea0c25097cba639ce245a19bdf52233e7a47399b942a6b854b1660f
SHA512b8968348f8c85415ed11ee2dd23e4de55f184c3f7c0e3d72d149633d91b9d51f420f6902331656f2ad9dcf9d09295efca784d39f1588ebcdedea52ed3a91c72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5669676b0c65c6fc147acaa143b53f622
SHA1986fa75343e835d2216d4a3b090e3a606e7492f0
SHA2567dc9bb5d4b8d8afb6e5764cc7b5ba47dda586e78689e8de1913e57d1e6ed7771
SHA512de3d9b775202d41bfbb3bc4b8cb89c9419e128e6f90f5d572c61428da659d07cc2cdfd339e52af529d053f9db3f7bf044f22a662baa7c09ee6a26cb826751aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597951a6a132914e591db126b85b20c61
SHA1109101b7d2c8ca557ddb9a625f9d5898445965d1
SHA256601dda77cf60b410be0e2ea7ef5c838bc872287fa7c1edc5cbe0c1979a5cbec2
SHA5124731f97458be16550a96db939d3467b4908a25bbf7d226187bbdb06bd363a3f2fa0854a89098c85cd3329a47f9a99c9a2968f2c133720053d158bb0be570ca64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8