Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe
-
Size
213KB
-
MD5
303775c9adc3380f20ce1e6ebf6d3a1e
-
SHA1
cdc095814bb120f51be73728f78dbe29e82eea9d
-
SHA256
f8cce268eecf24bebe0d96991f7013921fd9eb34570a09acfd6ad8fb6ff198f9
-
SHA512
94bd19ef4703790b819a211eb348186d7002eb8d9f96eef1253a447dd2e1df9eb8462b9fa1173ee6f49787083c49f4ee095c0693f85962575ae804e8bd349625
-
SSDEEP
6144:/+8ZepOGuDnw9tOJavXhe9Tedm/8b1tnawa:/jZepgDj44IyctnE
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 1948 RealtekAudio.exe 2656 RealtekAudio.exe 2788 RealtekAudio.exe 2052 RealtekAudio.exe 384 RealtekAudio.exe 1728 RealtekAudio.exe 2704 RealtekAudio.exe 1228 RealtekAudio.exe 2124 RealtekAudio.exe 2992 RealtekAudio.exe 1124 RealtekAudio.exe 1928 RealtekAudio.exe 1696 RealtekAudio.exe -
Loads dropped DLL 1 IoCs
pid Process 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipstack.com 4 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe 2880 schtasks.exe 1880 schtasks.exe 2572 schtasks.exe 896 schtasks.exe 1532 schtasks.exe 2392 schtasks.exe 2328 schtasks.exe 1680 schtasks.exe 292 schtasks.exe 2084 schtasks.exe 924 schtasks.exe 2452 schtasks.exe 1252 schtasks.exe 2220 schtasks.exe -
Runs ping.exe 1 TTPs 14 IoCs
pid Process 800 PING.EXE 2324 PING.EXE 2084 PING.EXE 2820 PING.EXE 1936 PING.EXE 1944 PING.EXE 768 PING.EXE 2520 PING.EXE 2900 PING.EXE 2280 PING.EXE 1988 PING.EXE 1140 PING.EXE 356 PING.EXE 2864 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2592 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2592 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2592 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2592 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 29 PID 2916 wrote to memory of 1948 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 31 PID 2916 wrote to memory of 1948 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 31 PID 2916 wrote to memory of 1948 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 31 PID 2916 wrote to memory of 1948 2916 303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe 31 PID 1948 wrote to memory of 2572 1948 RealtekAudio.exe 32 PID 1948 wrote to memory of 2572 1948 RealtekAudio.exe 32 PID 1948 wrote to memory of 2572 1948 RealtekAudio.exe 32 PID 1948 wrote to memory of 2572 1948 RealtekAudio.exe 32 PID 1948 wrote to memory of 2892 1948 RealtekAudio.exe 34 PID 1948 wrote to memory of 2892 1948 RealtekAudio.exe 34 PID 1948 wrote to memory of 2892 1948 RealtekAudio.exe 34 PID 1948 wrote to memory of 2892 1948 RealtekAudio.exe 34 PID 2892 wrote to memory of 2900 2892 cmd.exe 36 PID 2892 wrote to memory of 2900 2892 cmd.exe 36 PID 2892 wrote to memory of 2900 2892 cmd.exe 36 PID 2892 wrote to memory of 2900 2892 cmd.exe 36 PID 2892 wrote to memory of 2656 2892 cmd.exe 37 PID 2892 wrote to memory of 2656 2892 cmd.exe 37 PID 2892 wrote to memory of 2656 2892 cmd.exe 37 PID 2892 wrote to memory of 2656 2892 cmd.exe 37 PID 2656 wrote to memory of 1252 2656 RealtekAudio.exe 38 PID 2656 wrote to memory of 1252 2656 RealtekAudio.exe 38 PID 2656 wrote to memory of 1252 2656 RealtekAudio.exe 38 PID 2656 wrote to memory of 1252 2656 RealtekAudio.exe 38 PID 2656 wrote to memory of 804 2656 RealtekAudio.exe 40 PID 2656 wrote to memory of 804 2656 RealtekAudio.exe 40 PID 2656 wrote to memory of 804 2656 RealtekAudio.exe 40 PID 2656 wrote to memory of 804 2656 RealtekAudio.exe 40 PID 804 wrote to memory of 2280 804 cmd.exe 42 PID 804 wrote to memory of 2280 804 cmd.exe 42 PID 804 wrote to memory of 2280 804 cmd.exe 42 PID 804 wrote to memory of 2280 804 cmd.exe 42 PID 804 wrote to memory of 2788 804 cmd.exe 43 PID 804 wrote to memory of 2788 804 cmd.exe 43 PID 804 wrote to memory of 2788 804 cmd.exe 43 PID 804 wrote to memory of 2788 804 cmd.exe 43 PID 2788 wrote to memory of 2880 2788 RealtekAudio.exe 44 PID 2788 wrote to memory of 2880 2788 RealtekAudio.exe 44 PID 2788 wrote to memory of 2880 2788 RealtekAudio.exe 44 PID 2788 wrote to memory of 2880 2788 RealtekAudio.exe 44 PID 2788 wrote to memory of 3040 2788 RealtekAudio.exe 46 PID 2788 wrote to memory of 3040 2788 RealtekAudio.exe 46 PID 2788 wrote to memory of 3040 2788 RealtekAudio.exe 46 PID 2788 wrote to memory of 3040 2788 RealtekAudio.exe 46 PID 3040 wrote to memory of 1988 3040 cmd.exe 48 PID 3040 wrote to memory of 1988 3040 cmd.exe 48 PID 3040 wrote to memory of 1988 3040 cmd.exe 48 PID 3040 wrote to memory of 1988 3040 cmd.exe 48 PID 3040 wrote to memory of 2052 3040 cmd.exe 49 PID 3040 wrote to memory of 2052 3040 cmd.exe 49 PID 3040 wrote to memory of 2052 3040 cmd.exe 49 PID 3040 wrote to memory of 2052 3040 cmd.exe 49 PID 2052 wrote to memory of 896 2052 RealtekAudio.exe 50 PID 2052 wrote to memory of 896 2052 RealtekAudio.exe 50 PID 2052 wrote to memory of 896 2052 RealtekAudio.exe 50 PID 2052 wrote to memory of 896 2052 RealtekAudio.exe 50 PID 2052 wrote to memory of 1708 2052 RealtekAudio.exe 52 PID 2052 wrote to memory of 1708 2052 RealtekAudio.exe 52 PID 2052 wrote to memory of 1708 2052 RealtekAudio.exe 52 PID 2052 wrote to memory of 1708 2052 RealtekAudio.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2572
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YRAUwh2A5Ugn.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2900
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:1252
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rH6RAO8uYxGa.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:2880
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\48fKTRKcIoC4.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
PID:896
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CN6TTFAsdopZ.bat" "9⤵PID:1708
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
PID:1140
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"10⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
PID:292
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hJi2h1AAxiFZ.bat" "11⤵PID:1900
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
PID:2084
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"12⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
PID:1532
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\t72WMEwGPZRZ.bat" "13⤵PID:2316
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:2820
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"14⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
PID:2392
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\K3pLoGmFCfAf.bat" "15⤵PID:2688
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"16⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
PID:2328
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DdhYAZm7aNOT.bat" "17⤵PID:1360
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
PID:356
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"18⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XynJBSUvlorB.bat" "19⤵PID:3064
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
PID:2864
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"20⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
PID:2220
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gDDSBGKB6oVh.bat" "21⤵PID:1768
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
PID:768
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"22⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Xq1Rd1UVObiB.bat" "23⤵PID:292
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
PID:800
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"24⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
PID:2084
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kbP8Cm6AwNvV.bat" "25⤵PID:1956
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"26⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
PID:924
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\trpIDZvQHNY0.bat" "27⤵PID:2588
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:2520
-
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"28⤵PID:2420
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
PID:2452
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FiayE0CTGeqi.bat" "29⤵PID:2924
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
PID:1944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD527123c736347ba5406002bde06f12bae
SHA16b1daa7e991ca9e76771104832d8e0a2a6b8b8cd
SHA256a723f283cc694b3efeb42eeae90b141d03554b210f17339f82f36a7b52dbf4be
SHA5124bcba657ec3a27c8351120eff059e4c26a8d7c9144ee3cb4050f5de39d8c45a243fce5189780db5b8fdd24113d7aa2a13f0ac38a92c9e44fe16dcbae9326a234
-
Filesize
172B
MD533c1b8065af09cf6fce85b255de15f25
SHA1adb4a999bd39adb8516996858e1f1451152bdbef
SHA2560c829f71ec65f3dd9b9dc161cc62689c969018e7a41d424b66b6b6d13c76f3fc
SHA51275560d065a113ebeed736652bbb383cfed1f76ad7702713f28fe51141e054934de55c406791a2ab221bd6d191fbe72f1a220f72c3dae5ba042d4430a83eb5db5
-
Filesize
172B
MD5596fc6499c35ea4235bc86c9b1a33bdb
SHA160a526a039f3b4ff7d8632471aeb808a79778250
SHA256cb41495236c51b0a8e446081dad248858b5ad99535f168214b92bd6c5929d12a
SHA512a221b7c6364e07dfbc36121fbe0a7e260c6a3ad5433d90873cc6a92efb87a4c463e1ce9484ace996b6f6cc08af3c86c80b7e45a27ea22d45d18c559bfa48519a
-
Filesize
172B
MD57c1782ad0209de27fde5081babad92f1
SHA1e31cb7ca551afe00a582e295971d306a1e063f3b
SHA256188e1afa43ccd2a734730c87616664a9b8e8a1338b470f7a9ade967ffce6f67e
SHA5120f1eff30a41d286801e32f603acad876d1edc43d0c0003f403292bfeb212d676bd3930240c9689355f3b724a51b143c8e226743ba2d35c30edf4eae6e788bd8f
-
Filesize
172B
MD52631500ae2966721b673302cbccc6f23
SHA16e46204431e417c733ac8454f719c7c8eb327ebc
SHA256063e2352ec765b1a130ff072b1ad3b109a754a3ee363e796788ec7c516a9d5fd
SHA512d608588d1a418c7137c1b7734326b87a180331795d9654abfe352e893437126b782bc1839f49e3777031ee8ecaf8aa7cc6bee7932680b7da086752474e5ec99f
-
Filesize
172B
MD57b38201bd31c4fdd4b3e41ee8973efcb
SHA1f0656bfef166453fe87d5b1573d1db49b1d7fbe6
SHA2564d13e31f7c9b39a2993eb3e5999c6bb58d167fa024d36127faea852fdc3b8a6a
SHA512ab430adf238a2d5d44491c2dbfe9daad5c38d1bfd5da159e37b4c90673252cf1741a774b067a88187f0d78babf4bbbcd676521105e62f062e6bca02b5c6e162f
-
Filesize
172B
MD5aa2159e7b0c19c242a1a3090ab06e474
SHA1dad90aa321fa6b8eeb752798928c68d0d43f9175
SHA256b97a33cc1334c5ff0dac331c4ba00bfc99af21bfb525521e98a01f935200c703
SHA512fd77246decbae3137ad2e30559bdd647bbebfe49cbd62beed44d74732de603a95e3adab0cfbe69924d49a42c7ce5968f2a7ffed4e6bc2c95cd61b4a104d3271b
-
Filesize
172B
MD5e8146f24064ad7a832b2976d44d1337a
SHA136ee8ae59807c89c54435b0945a2ea3e6523f19a
SHA25689f52091f72a5513069e94c043ea20c80827cef5bcf1b5ce41cc30d6ec8e2662
SHA5120f762238d909dfc176edc0a4a1f571a1604d99a6b5b7e58f55de5ff4d8df472af2d1daf061bfcc71f5e80dc40fd5711dcac42733f8fbded84e447ce2a10d1afc
-
Filesize
172B
MD586772c8fdf96c21c99a13e2ace0a900f
SHA120e69e7b7103a8b11b0396d321ce3dc765252592
SHA256784eebbfcc1b445a091c48baebf111c65745ab1fcb973c99bfb3a4634011fd22
SHA5120cf3bf213c929fe5ec323ad3fad54adf5aa8e29ecf1e6636d5294929b2210adcb5510e0ca2df23dbc77f3b880c676df1b6ecb807fa64e476334c672a7101e72e
-
Filesize
172B
MD5535cbef6bd949c8447b49a7e8ffaec35
SHA142f44b34ecc84b31b1f160dddf2fee5cb3c693f0
SHA256d3e0d856c13cc488a167d0a92f90080077f791f29a3fc5c613013a19cb42414a
SHA5129a566ff4b0c31afacce36687f1e85ce361b7864ee9f5b9a09120fd326ccf15b42d3c403dfc698d5658f2c946cfbaf9fef4e4641910650dc304cbe7a20b46b6e3
-
Filesize
172B
MD5a786289f62d7e8866f1a53f74530f8bd
SHA152d4d8d8c62905a5a595d38914efa3a68e31a402
SHA256f89cf606acf8357b237ebb6699c89c56aefbbada3356fe8ded85799259189bb5
SHA51225851bf818d58409f70a978ae4c3f5178eea1632fb683ab8d8c2e4ab957ecc6bce12d8f64bc9c3d80d6e86d18739c78e3be381ae434ec7be5dd811995daff772
-
Filesize
172B
MD54a61860579e76a577f22293d0895463d
SHA1ee2c79f4084ea66664f3d83a85af6b443b10a8da
SHA256ca3bacaf6eb5206663c70261252cf560e4fc7c365c8343d2a21c5d51471e0de5
SHA512f045435401727964d79e89d04bd9b5c96c44145b101190540cd0fd1cda7a736ef7a8ba374abd84bf3a7b68d734366a84ef34c33e5fb32e0cd4ac83d54a91bd53
-
Filesize
172B
MD52a81337f5ed93bc8211da5f2fdd79578
SHA1e46026d9cef08559d591ed844434f1d8cd7f9a98
SHA256627916bdaf2d6990ba6df1a2fd1fa50fa4b874e438197f222b4541093fdf3225
SHA512684ff543c32536e40da475466ff467e96b5ca2052178eaaa4e2e588ebe993f3c6e9c7599f1e82fb123b2ae2ea466b56fdf6a24121d50730cad4a2cc3bcb630f5
-
Filesize
172B
MD5d8ce7a006e481859aab96f2689c9da16
SHA1cb081657c946eb2168e17851625cfcf20d46ec86
SHA256a35d1d58aa2e75fe8bbb5443939b45cabc4415c059021bfabc72008d389f1c34
SHA512c760f48d9436785f64074e0af51b8035f961e9bd78dad6a973082a00a3feb76252b5ca564228bc92511266f9f51b0bc53a1584121d822892a479279c67dd1537
-
Filesize
213KB
MD5303775c9adc3380f20ce1e6ebf6d3a1e
SHA1cdc095814bb120f51be73728f78dbe29e82eea9d
SHA256f8cce268eecf24bebe0d96991f7013921fd9eb34570a09acfd6ad8fb6ff198f9
SHA51294bd19ef4703790b819a211eb348186d7002eb8d9f96eef1253a447dd2e1df9eb8462b9fa1173ee6f49787083c49f4ee095c0693f85962575ae804e8bd349625