Overview
overview
8Static
static
3f8420cad98...18.exe
windows7-x64
8f8420cad98...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1fr.exe
windows7-x64
7fr.exe
windows10-2004-x64
7pn.exe
windows7-x64
8pn.exe
windows10-2004-x64
8Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
fr.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
fr.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
pn.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
pn.exe
Resource
win10v2004-20240412-en
General
-
Target
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
f8420cad9886537d355d8f2712a7c8da
-
SHA1
917c22a311cd01f3ddadd20d47f614bb3de3a11e
-
SHA256
a4ea700b81162fffa25eea3aefe0d4118601ae8acd0123f08e487c4c8bc0ad84
-
SHA512
126364eb1374cc772eb59467cc757954c4136ef6cbc945218f48e80017d374bd0a1fd226002d71a1e191dbc9a0f7605fc05bdc64b8e31edd1f76ccffd00f9ec4
-
SSDEEP
24576:N/O1ZB9xBF+di6U3atJliqn5hqiKEAAE9XKmdLe5tb+z:RO1ZXFko3+DV5hnKEfH6Sb+z
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 9 1804 WScript.exe 11 1804 WScript.exe 13 1804 WScript.exe 15 1804 WScript.exe 17 1804 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk fr.exe -
Executes dropped EXE 5 IoCs
pid Process 3024 pn.exe 2132 fr.exe 2628 Esistenza.exe.com 2500 Esistenza.exe.com 2948 SmartClock.exe -
Loads dropped DLL 17 IoCs
pid Process 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 3024 pn.exe 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 2132 fr.exe 2132 fr.exe 2132 fr.exe 3024 pn.exe 2732 cmd.exe 2628 Esistenza.exe.com 2132 fr.exe 2132 fr.exe 2132 fr.exe 2948 SmartClock.exe 2948 SmartClock.exe 2948 SmartClock.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" pn.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 iplogger.org 9 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe File created C:\Program Files (x86)\foler\olader\acledit.dll f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Esistenza.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Esistenza.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2172 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2948 SmartClock.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2628 Esistenza.exe.com 2628 Esistenza.exe.com 2628 Esistenza.exe.com 2500 Esistenza.exe.com 2500 Esistenza.exe.com 2500 Esistenza.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2628 Esistenza.exe.com 2628 Esistenza.exe.com 2628 Esistenza.exe.com 2500 Esistenza.exe.com 2500 Esistenza.exe.com 2500 Esistenza.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 3024 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 2864 wrote to memory of 2132 2864 f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe 29 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2872 3024 pn.exe 30 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 3024 wrote to memory of 2752 3024 pn.exe 31 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2752 wrote to memory of 2732 2752 cmd.exe 33 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2820 2732 cmd.exe 34 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2628 2732 cmd.exe 35 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2732 wrote to memory of 2172 2732 cmd.exe 36 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2628 wrote to memory of 2500 2628 Esistenza.exe.com 37 PID 2132 wrote to memory of 2948 2132 fr.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\arose\pn.exe"C:\Users\Admin\AppData\Local\Temp\arose\pn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe3⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Ora.tif3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^riubUwhJVBcAWxPbDOSEYgKBaLKelDDKVoOIIXjPsUNHnzwOpkOcJtQPbFyodknaYLENFuOFCehtBeeYKVTZOiqQaZkrRrnucxJNOhoevoTGRLhxDunxsmDQKNcGULNnEuIuzg$" Poi.tif5⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.comEsistenza.exe.com Z5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com Z6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kcnkojrnph.vbs"7⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1804
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 305⤵
- Runs ping.exe
PID:2172
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\arose\fr.exe"C:\Users\Admin\AppData\Local\Temp\arose\fr.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10e1e370c1b0a5db4a31af81ec4a8ce
SHA163a40cba4a5e13b6c32c45d0ba94c2a2ec85d8fc
SHA25689de99756670e27dd04d58f9346838b6e567aa1f5c75120414b60f69f241b27a
SHA51251f3102fe85edd6d93b9d5835555f5486de8960065a8a90203949363e1a8d30911954bb18ac57501fb9be885d28a77d7814d3b4f15919f8c27fe02aeff69f1e2
-
Filesize
297B
MD5bd0c2d8e6b0fe0de4a3869c02ee43a85
SHA121d8cca90ea489f88c2953156e6c3dec6945388b
SHA2563a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533
SHA512496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
139KB
MD5f0b4f2be629c1200116f93db3cdf0868
SHA1497ec65d2fd55e5e55a512276aa44d606b30e3df
SHA25695c72f4f5e0b834a0aedcfd804dce6fa3f9d178756ead9015e15acee9f30c8de
SHA512f77f38247952d6f21f1d5bcc2a203e9d3ca1d4df2b57c0067baae1e16439fbed6434a93be04fdfa405043d7b7300a4ee99d26ef8b73d26f5b359151acdebbb00
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
520B
MD52b01aacb646ebfc44f2e1e479735fda8
SHA1a86a3a3029b63b758b641812d9293dcb7a264981
SHA2567847fb21cff01ce0a99eaeae0d46d48bd39d556bdfcc46ba7cd9906de0c2a420
SHA512859333f012b37649fafc0c4318de30f5e5e1002b1a575ce9d197444f3682ba817e1e151d8aba1608a23946f0adae10431926ba8e60301fbeb5df7b4cd6724b5a
-
Filesize
697KB
MD5eb38b72baef5c44e96f939c9f0909256
SHA1e2b0dadd14ac172b5a42cb51428f4c70d2bcbedc
SHA256f49efb6f2d8f46ee1bb971450e930f2018668cda103338abfbf16f3b806afb87
SHA5125f0cb16966c20841c33e7c20311fa01b7247b42659c30a432783ff133dbf3e8da417708c4b7822a3b171ed9a5128574112c5a28de3c9104ef9d105264768fc9a
-
Filesize
872KB
MD5d5a0a9ee1b5cf11c5c4deb0a3181841e
SHA16f61c6c775c57f7d2fde6ee8dada897996c046c8
SHA2569e84d447e57bd729e500a0a4df6941502fd2a05eb5eca5e7b6d022547d922487
SHA512e0676ac7c72860433fdbfa96201a8fb829a761b204c30cb991672465edac9eb294a535f96bb9f4d5383b246ca6b80c8cf3d9a59127c023a24f818ffd189e40f3
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
148B
MD51daefa09680f4bea97d1d186a7ff9991
SHA14c7013ed0bdba7f2e504a032979f87bbe5b0c812
SHA256fde13261bafc7fcdb55e515f2645869d00181d8df511ec1ea3700de40bf62826
SHA5121e5d256d8fb50f495dcf0377582b2281a6491c140ff65698bf4520d9cb57bca9e375637fa6e1077fc64e6f3ab626c787e41b7373a549cdcb45825e458aed7b58
-
Filesize
335KB
MD5642c6b02eaaeb1d68a822c14af3f6bab
SHA11f2eefedb9ad59d046725b20246d10e7462f9813
SHA256b973e7f93d2181b7435107ae5b548c091f79a1cda264899f5d500e44df5489a5
SHA5120dc14379ef493020286ae40d906b3f2c905e3a99113b530451b12209a6357c178a89598ae0535cfdc6b3f17ae15daa2a791dea76acb9685661b170740a0ca1f1
-
Filesize
965KB
MD52e59df57056cb7265bf9a9906a82e9b5
SHA16b473b2d49de1e9a27b6bb16e911cafe560d006c
SHA256582a359a06d6306eaf4b289f284a6c7da778484aeb1a0690c55c815e1c07a1ee
SHA5122ee3c1f2ad61d2266e22f2425766a5aec3fd10cc768e5bfd35115bd45f26edb3dda0fa89708324652baa24df75694d4acd7d2e751d9894611dde37a5d1b3d53b
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada