Analysis
-
max time kernel
137s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nxs.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nxs.dll
Resource
win10v2004-20240419-en
General
-
Target
222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
222cefea1dc7c12860abf0d8270a650b
-
SHA1
f39d957e969e9ae4fca7cdbb6b3c6c69a19898d0
-
SHA256
16a00880f3f5c82e93e3b60a0e79c0c29b9e0a5ec1b88e275a5915f6577451d9
-
SHA512
3eec4f19a2be9135143317319c13b2dadba53b1ac629f3a47d41cc6047fb759bbbcb5ed4fb6222d7e2a45a9f77beef8ed7d9d704bfab33b9bf2b581c3b7f365a
-
SSDEEP
24576:TxEq5GZN/Kfcg8oq3CvMx/o9YD66gK2wu6p/N89Q:9+N/eG3CvMx/o9n6gKFus/N89Q
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000023bb8-219.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 4536 12ce1ca6209d706d9bbc01528b62bb08.exe 2280 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 1428 16cd42a9276a6da3b0133253bf71f40b.exe -
Loads dropped DLL 23 IoCs
pid Process 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 4536 12ce1ca6209d706d9bbc01528b62bb08.exe 2280 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 3332 12ce1ca6209d706d9bbc01528b62bb08.exe 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 1428 16cd42a9276a6da3b0133253bf71f40b.exe 1428 16cd42a9276a6da3b0133253bf71f40b.exe 1428 16cd42a9276a6da3b0133253bf71f40b.exe 1428 16cd42a9276a6da3b0133253bf71f40b.exe -
resource yara_rule behavioral2/memory/3332-226-0x0000000003410000-0x000000000341C000-memory.dmp upx behavioral2/files/0x000a000000023bb8-219.dat upx behavioral2/memory/3332-466-0x0000000003410000-0x000000000341C000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 12ce1ca6209d706d9bbc01528b62bb08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6a-10.dat nsis_installer_2 behavioral2/files/0x0003000000022ab5-279.dat nsis_installer_1 behavioral2/files/0x0003000000022ab5-279.dat nsis_installer_2 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5084 WMIC.exe Token: SeSecurityPrivilege 5084 WMIC.exe Token: SeTakeOwnershipPrivilege 5084 WMIC.exe Token: SeLoadDriverPrivilege 5084 WMIC.exe Token: SeSystemProfilePrivilege 5084 WMIC.exe Token: SeSystemtimePrivilege 5084 WMIC.exe Token: SeProfSingleProcessPrivilege 5084 WMIC.exe Token: SeIncBasePriorityPrivilege 5084 WMIC.exe Token: SeCreatePagefilePrivilege 5084 WMIC.exe Token: SeBackupPrivilege 5084 WMIC.exe Token: SeRestorePrivilege 5084 WMIC.exe Token: SeShutdownPrivilege 5084 WMIC.exe Token: SeDebugPrivilege 5084 WMIC.exe Token: SeSystemEnvironmentPrivilege 5084 WMIC.exe Token: SeRemoteShutdownPrivilege 5084 WMIC.exe Token: SeUndockPrivilege 5084 WMIC.exe Token: SeManageVolumePrivilege 5084 WMIC.exe Token: 33 5084 WMIC.exe Token: 34 5084 WMIC.exe Token: 35 5084 WMIC.exe Token: 36 5084 WMIC.exe Token: SeIncreaseQuotaPrivilege 5084 WMIC.exe Token: SeSecurityPrivilege 5084 WMIC.exe Token: SeTakeOwnershipPrivilege 5084 WMIC.exe Token: SeLoadDriverPrivilege 5084 WMIC.exe Token: SeSystemProfilePrivilege 5084 WMIC.exe Token: SeSystemtimePrivilege 5084 WMIC.exe Token: SeProfSingleProcessPrivilege 5084 WMIC.exe Token: SeIncBasePriorityPrivilege 5084 WMIC.exe Token: SeCreatePagefilePrivilege 5084 WMIC.exe Token: SeBackupPrivilege 5084 WMIC.exe Token: SeRestorePrivilege 5084 WMIC.exe Token: SeShutdownPrivilege 5084 WMIC.exe Token: SeDebugPrivilege 5084 WMIC.exe Token: SeSystemEnvironmentPrivilege 5084 WMIC.exe Token: SeRemoteShutdownPrivilege 5084 WMIC.exe Token: SeUndockPrivilege 5084 WMIC.exe Token: SeManageVolumePrivilege 5084 WMIC.exe Token: 33 5084 WMIC.exe Token: 34 5084 WMIC.exe Token: 35 5084 WMIC.exe Token: 36 5084 WMIC.exe Token: SeIncreaseQuotaPrivilege 2936 WMIC.exe Token: SeSecurityPrivilege 2936 WMIC.exe Token: SeTakeOwnershipPrivilege 2936 WMIC.exe Token: SeLoadDriverPrivilege 2936 WMIC.exe Token: SeSystemProfilePrivilege 2936 WMIC.exe Token: SeSystemtimePrivilege 2936 WMIC.exe Token: SeProfSingleProcessPrivilege 2936 WMIC.exe Token: SeIncBasePriorityPrivilege 2936 WMIC.exe Token: SeCreatePagefilePrivilege 2936 WMIC.exe Token: SeBackupPrivilege 2936 WMIC.exe Token: SeRestorePrivilege 2936 WMIC.exe Token: SeShutdownPrivilege 2936 WMIC.exe Token: SeDebugPrivilege 2936 WMIC.exe Token: SeSystemEnvironmentPrivilege 2936 WMIC.exe Token: SeRemoteShutdownPrivilege 2936 WMIC.exe Token: SeUndockPrivilege 2936 WMIC.exe Token: SeManageVolumePrivilege 2936 WMIC.exe Token: 33 2936 WMIC.exe Token: 34 2936 WMIC.exe Token: 35 2936 WMIC.exe Token: 36 2936 WMIC.exe Token: SeIncreaseQuotaPrivilege 2936 WMIC.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 668 wrote to memory of 4536 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 92 PID 668 wrote to memory of 4536 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 92 PID 668 wrote to memory of 4536 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 92 PID 4536 wrote to memory of 2280 4536 12ce1ca6209d706d9bbc01528b62bb08.exe 93 PID 4536 wrote to memory of 2280 4536 12ce1ca6209d706d9bbc01528b62bb08.exe 93 PID 4536 wrote to memory of 2280 4536 12ce1ca6209d706d9bbc01528b62bb08.exe 93 PID 2280 wrote to memory of 3332 2280 12ce1ca6209d706d9bbc01528b62bb08.exe 94 PID 2280 wrote to memory of 3332 2280 12ce1ca6209d706d9bbc01528b62bb08.exe 94 PID 2280 wrote to memory of 3332 2280 12ce1ca6209d706d9bbc01528b62bb08.exe 94 PID 668 wrote to memory of 1428 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 96 PID 668 wrote to memory of 1428 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 96 PID 668 wrote to memory of 1428 668 222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe 96 PID 1428 wrote to memory of 5084 1428 16cd42a9276a6da3b0133253bf71f40b.exe 97 PID 1428 wrote to memory of 5084 1428 16cd42a9276a6da3b0133253bf71f40b.exe 97 PID 1428 wrote to memory of 5084 1428 16cd42a9276a6da3b0133253bf71f40b.exe 97 PID 1428 wrote to memory of 2936 1428 16cd42a9276a6da3b0133253bf71f40b.exe 100 PID 1428 wrote to memory of 2936 1428 16cd42a9276a6da3b0133253bf71f40b.exe 100 PID 1428 wrote to memory of 2936 1428 16cd42a9276a6da3b0133253bf71f40b.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\222cefea1dc7c12860abf0d8270a650b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exeC:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exeC:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exeC:\Users\Admin\AppData\Local\Temp\12ce1ca6209d706d9bbc01528b62bb08.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\16cd42a9276a6da3b0133253bf71f40b.exeC:\Users\Admin\AppData\Local\Temp\16cd42a9276a6da3b0133253bf71f40b.exe /CHANNEL=DESCAR010Z713bc18f1e09e07cc9d1cc2bf3db512f /FORCED=12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /namespace:\\root\cimv2 PATH Win32_BIOS Get Version, SerialNumber /FORMAT:textvaluelist.xsl3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /namespace:\\root\cimv2 PATH Win32_ComputerSystem Get Model, Manufacturer /FORMAT:textvaluelist.xsl3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725KB
MD5dd85abf81ead50d21ba79c6b579bc940
SHA1094a966b79b78146e0f36f28d329416c51482767
SHA2561f65b467201c98a7684a75493e4268abab87593a831f50183d7a0b941913dde7
SHA5121c96abebcf84fed177d7c5a1a0ab4c4943c69ff6054dfc7ae0246b4c38ecf88833a85d3b46ecd1b11a11b9d8950a67f704922418206b96daf9e9ed7e974562a1
-
Filesize
276KB
MD5dccfda7e0323fbd0cf3542c579a1a50f
SHA12212ed5f56a0dd2b61200ba8625cacf138faa74a
SHA25622a16ff5daa60c20d37c6a130d0192026ce51eddc56f121ac2f8646b6c882529
SHA5123a746b3b30d7e5b9c17c276928663d53190a1a9a0f3dde7781c379be5e04f9008a73faec6164e0575fc01bed2650b7f3088492bccc380ad2b44ddcc154a0bc8d
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
130KB
MD58cfcad073ee407ed9d347e66ede2b0e5
SHA18ff0e4acb5eaff7dcef517bbc06f5514ce037b3a
SHA25673be46ee304981b7e5f9ece3a0222b4c53717450b630a70c997d2d63bced9ac1
SHA512d86176791f0e5f7b047add20a7c9ce03ddc881819055cc6ae98d113707b89a19ca1f7637cf2a2cc6ffdaf794b673f13a6ac933212794e5ff6c32d28b18e360ca
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD58ca09b6200ffa05b54c6672d855beb4a
SHA1daa16fe49c8b2250e9d2383b861cda51f876de49
SHA256033e93ad470241c92762924ccfceafb849a525e263e5d4a3dbcfc2e07a8803c3
SHA5126ab97181ec45430888d8ad3fd411de22423e1c057833e282af085a975198338c95f7ba10b7c69f33298afc88ddd38d01ab010998fd4a8ba8abb8561796bf9f14
-
Filesize
62KB
MD54e08fe995ab74ba4d145ddb77ea095fc
SHA1e4bb337e40069c097e7abd566b7427b11fb124ee
SHA256ace3c561f186dfbb5c992f85ea2ab4d3061894509af6960e9d819152afa46b17
SHA512b056fbe0e79d90f8ce0908eb2b75f589e4415ed462868aaff6032f12dde394058cd221d317b92fc4809aa27d6cf2e801c4215db3cab1267ebd9dbc9af7b7041f
-
Filesize
12KB
MD53d8665da9f10eb1cee52aa10aa63103e
SHA1c93598630895b60cabfd22b4fc280158f70e75d9
SHA2565894c927a6b2d7c5c0d43bcb24ba6235ed7a2a1e8d115e3fcea910723eb521d4
SHA512e5a06fa3286319dada66cc0754bd8881698912c917c9b900f22b54f95e3f4b05577b473fac7bdc0ad1ed83457e200103ff2e3361cc6c9b21f969939e4942f7b1
-
Filesize
11KB
MD50a29e1b270ccea61aba7d7cdd10e0388
SHA176bf03361bcaef475ffb864bc1903c9bcaac7b44
SHA25667328334d53e7c0c52c23ef5febeb1ab34d87ab7699868a9f547e5b0db4fdceb
SHA512d024407b0852155c225852e6dd1a5440241a16c4b54a408606318ad142381ebf51bc8db09a4d175369619aaac2224311914892d23f763f7b533a6b664b93cf7c
-
Filesize
18KB
MD581f3897e210d2c45e9da3670c7dbe4a7
SHA10f5fd37672efd549b2fbf89770ed5c95f388fc86
SHA2565afcc891c767234cdd33d49840f35993cb23d6e4f6c31d0afa612deab9c185c9
SHA51206d7be2569a0919f71d427f2f71862ff66a58c63103f714790c51152a359d3057d1208525de3a17d9e6ebca72991e3524689d28cf750ca86f692a1ea380cf83e
-
Filesize
193KB
MD5e390287499549de31da007f7f0ae4d10
SHA1a8c6caebb151d60ea56f4c96a7194c0e5f076692
SHA256b2e3b0e8d6c3fd23dc7d94fccc5151f07bf2e59271431268a58b5e99074b825b
SHA5126c393bca7ea74747917e65f2e5e4822f034ef60defa5f3232b8f9a731ac8e00cffee3d44ab817f3986739b685506e0027647de50b3534e3436ca569d0c25b474
-
Filesize
45KB
MD507e03b7a67edf8aec9fa104ffb26b69f
SHA1b2cc254605bc136e9f1bd29c6dd90eee767b2cfa
SHA256293487a745a18ca2054037bb7a69ca7c4bbe19c1fee7ce62cf88672e9b2d064e
SHA5123c2cdc34bb9c18329b475daba4a68f4fe5dbb829e45871286f0ccd3fd475d895830f31cf091e909986367da4c00e0a651c1405f9857998aa5800389d73aa2542
-
Filesize
4KB
MD57dec81a81d64a228af2aa5dddce127b1
SHA1304dc81198081ca2d015ef7dea88a987c7910950
SHA256a6aa1794d8bbafe238f8ba92d62f18bd61ff7884e591582390f3343da3550047
SHA5127ee2dc6bf040ccb1204d90fd025254e7e425eca2fb6a71b18a1c8cdfd489a88c70038e655a29d26e482575e0cc83d585499cc5e6ff215d548befadf117cd156f
-
Filesize
15KB
MD57bf73b6249ed6cc73bc9af1fe5d3bf6b
SHA17f25228043b91a11eb02e443f2b3f20e88edf008
SHA256f4c4bd5657b442b51e962d6c05ad79befc911d217f4131f8a6074f018d32dd98
SHA512c2989717fd2d2676ed2ebcb2a56a68def862f5cbe721c0ce0f0a68a0bc9147a6a6f4a8b41f085a17709cdaf04cf79d5621eff198a1ccb0007ac6aa852526c93d
-
Filesize
8KB
MD5f273a694acedd917336a47ab09efe2eb
SHA18ff862146d5f939ad4de785a9bce2378ef5b8d98
SHA256065a0d4ccd9d5019cb97232a67f5c5ae3e6cb943b48f263f1d1eaf21e15c0e5a
SHA512aeee518d9ef1659372b9b46a09f7bf22ae439e8cb5abf6c588c8fc7971d534388e4ec3ca3fa1e02fb374ee3c5b399e94430eaab87423cbec385ca2db4aa99d4d
-
Filesize
392B
MD577c50916f90b43c09e38e07b94ce4356
SHA12407be8f458d1aa2f1ffa45b21f782c44e68331f
SHA256902fc7d3982d9386d60c4c304574381563ee28e73de993e28cde7f90499ca1cb
SHA512039a24175948dfbd8c23b070d3aeb7bd93186a6093cbbe760981f1ef87bf7f97ed1f6bf5c6a7d2b9b12834e6776da03c40a03f7f43a9d7803a7f459a8a023ccb
-
Filesize
8KB
MD5e440044afe6c761507a996b5b45ab0f9
SHA1ef772c758fd5d6098b41375f35ac26f3963cc306
SHA256b1864aed85c114354b04fbe9b3f41c5ebc4df6d129e08ef65a0c413d0daabd29
SHA5128a82df90459929de1c91ed29a122a149749d42adbb85faf0c3123d0f0886babc90cb93de85105feb7497b46552a6747ae05b985f5a488d1d8f1a2a7db44077b4
-
Filesize
80KB
MD54bf7db111acfa7c28ad36606107b3322
SHA16f20b9f6663ce0c309a2ce60e718d64ffb6c75b3
SHA256bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0
SHA5120a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6
-
Filesize
25KB
MD50f26c6d34d3841e93145dd00d0175651
SHA157b068569d0eb2336503beed87589629ab2a6f1f
SHA2560cc5dc45b6a04ec236f4ecf0eeee212096b1561179d71c49dd5fc82aba706741
SHA51272785e520d78a4ebd8779e5497806406c1b91b9c05ed82a392a6af689781e26c77f0032c66540b80e2e7e457128df2afd0647b0dbc970a11d0cd4ee3930d47a5
-
Filesize
11KB
MD57292b642bd958aeb7fd7cfd19e45b068
SHA119a800620d041634abae5b5d096cb0e87ce4c188
SHA25690f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09
SHA512bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a
-
Filesize
10KB
MD57e3c808299aa2c405dffa864471ddb7f
SHA1b5de7804dd35ed7afd0c3b59d866f1a0749495e0
SHA25691c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd
SHA512599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738
-
Filesize
4KB
MD5d02a497be5f89c44827f142c4662f591
SHA138f83ccbac11de069df0e1cd79a6fdf7f006516c
SHA2566d29dfd24695535b5973d8261d93373603ceaae03ab97662fe1b3dcc47d18226
SHA51281c87f9d56a8ab7703a4effd3ba7b982b6765ecbdc0dbb1c595f549c4310a5db57dcdc38929eafe56983ea8cefc0b572c3faf82a4b62eb7c564b05550215f1c1
-
Filesize
13KB
MD5d4913b3dfc6136467ca1367e5464f32f
SHA1f186c17758c4b95770f2bc4004e3f672a47d12bf
SHA2560ed1939e72fa1e6e24e5c3b8dd1ee8604b4572711d1274fa16dd0d3a46d6b848
SHA512c0e40fda1bf6833a039dbb4046439b25321789d0395a07832f10b3ebe5051d6905a506f1922f0f3ce54a78795e495fe2c08899f2254264035e7fe236cce3f4f3
-
Filesize
8KB
MD56a544a1476ac90d7083dfe39ad6ca7df
SHA1e6228d3efb9bfafc743ec174cc8c6d3b5b58a685
SHA2561994f9e3e7ef24737ead6cef4bfe1984afe97ee5aab758ca73058ed7f4419dc7
SHA51224b300d1e66f1ddc38635e517f6a83121fef2049e30269eb83d8fcd7e838c3e25d12567d717e400148ce67940e16fdeefce081d95bd80e8e605d557eae65e30c
-
Filesize
2KB
MD54bfdaaab9014fe129bc6388fd5687c8f
SHA12c6ff28245e1dc7ec9ac1c43c3cda354d07b2c4a
SHA256e9167e0da842a0b856cbe6a2cf576f2d11bcedb5985e8e4c8c71a73486f6fa5a
SHA5123a1a4d838bb5cafe71da262ee7bd6dccbd30dd4d7abe0d04f6ecf96bf704d5e111967be812894a47f2eb3374ee110620b7cc47eebac8b72ddcf7f506ba82a607
-
Filesize
4KB
MD5f74fde2b2767ee1c6bd629f1f4e86843
SHA169545a460f4ab38a2e952c8027616edced07ad20
SHA256d0072d2890f1cdffaa802be7989cab29a24e38508d53ab47ef9e1c40b0c2c52f
SHA512b62cc38fd1694508e46ed56d57043d6028a1b472b52737a89cbdf55be641b95e03f16160c24df247cb7a2d0be11e108b4db5a43ae0068ae3b87baecb4aa82413
-
Filesize
56KB
MD56ace28d17180238a83ecdc3bd554e9c2
SHA1581b8e2a02efc645b8a05955bff7a18d38fcf170
SHA256073296ccd19551ddd8e8dee9f2d4a927ec818c6acea958b3d50e8e49098a69e6
SHA512c0f5703666046657019fbe80d4598a39dad212d1cfd789d8f66185f935e37870cb3d76c7869856ae6b30a2856751bacb4ef4dcfdb5e1655483c6a346705e597c
-
Filesize
52KB
MD54a4845ba1666907f708c9c10a31ec227
SHA11ebf626adc84147e5114885ce779f92d6eb68f3a
SHA256a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d
SHA512d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464
-
Filesize
2KB
MD58004e3f267460e8a83ed24b72291f6b1
SHA101766537875cddf1d48a1d87e2048641c1b4b368
SHA256d2c6858503e065ac5f751365349f236706edbfbdca4b86ed7ea9ef8626996c48
SHA512995b2bcfeeeb7b3a329169973b2d9ba9f69e1042f2b74bb65e9b523c158279425f1dd0688eeb5291850580fd3bc053ac099bd055b8b31ea92625763446525cda
-
Filesize
255KB
MD5fceee0026aafd237afdb4aea4ecd3557
SHA13e10da57143599eae915a688178abada78b8d82b
SHA25685db1e17c0fad08d9732405e781cda1e1613ace31c540a6e559cd8777df2c62c
SHA5129c974918c8afec8d8a58fc1239f269544b9dfe867459bb61901462f56f71a3dd574d3b2263dd14b99ff8a23c8096c408be3620785fd4476b975a43b999f559f2
-
Filesize
53KB
MD5966e7a1d6e0124af8fb30584ac477fb1
SHA1ab6d78d224be0d504196661b12ef65fd4f35d422
SHA256df0e627304add6595e583d7bb7843ce21f51ab2a5b56526d3f0a0b5023183e65
SHA512d82900eb32e12781f87481edbc4ac873e9b13dd98d4bd3c695a6c0bbe70753b5854dc002c8e65499e5d5ce315d537a5bbea726456c187f9cfbbee30afaf74fa3
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f