Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 13:49
Behavioral task
behavioral1
Sample
6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe
-
Size
11.3MB
-
MD5
6b24d98d7a70d7137d0ffe9e7d162d3b
-
SHA1
5085ed238492cd43bc4cb242b04efc38eab40416
-
SHA256
f8a1659061e1fbc3c6595caefe7f6c30b885a0c6c85084773227650af97aae0a
-
SHA512
08f5046e5c9a51b2e92c57ec18113da963dde694601c1e04dbcd448168d59f2cdc74c44ecda261996bfb61a67c309d4d8d46c86932f4b591d27029dc5383845d
-
SSDEEP
196608:3hO8jE3joP1HSsimvlGbsMs0tbYPvbJQlHJCZmC58Cg5nqM2DtB:3hqkP1pimtykJQlpuQM
Malware Config
Signatures
-
Loads dropped DLL 38 IoCs
pid Process 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com 21 ip-api.com -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1248 ipconfig.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1500 1668 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 28 PID 1668 wrote to memory of 1500 1668 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 28 PID 1668 wrote to memory of 1500 1668 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 28 PID 1668 wrote to memory of 1500 1668 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 28 PID 1500 wrote to memory of 340 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 29 PID 1500 wrote to memory of 340 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 29 PID 1500 wrote to memory of 340 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 29 PID 1500 wrote to memory of 340 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 29 PID 340 wrote to memory of 2248 340 cmd.exe 31 PID 340 wrote to memory of 2248 340 cmd.exe 31 PID 340 wrote to memory of 2248 340 cmd.exe 31 PID 340 wrote to memory of 2248 340 cmd.exe 31 PID 340 wrote to memory of 1248 340 cmd.exe 32 PID 340 wrote to memory of 1248 340 cmd.exe 32 PID 340 wrote to memory of 1248 340 cmd.exe 32 PID 340 wrote to memory of 1248 340 cmd.exe 32 PID 340 wrote to memory of 1152 340 cmd.exe 33 PID 340 wrote to memory of 1152 340 cmd.exe 33 PID 340 wrote to memory of 1152 340 cmd.exe 33 PID 340 wrote to memory of 1152 340 cmd.exe 33 PID 1500 wrote to memory of 648 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 34 PID 1500 wrote to memory of 648 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 34 PID 1500 wrote to memory of 648 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 34 PID 1500 wrote to memory of 648 1500 6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe 34 PID 648 wrote to memory of 3060 648 cmd.exe 36 PID 648 wrote to memory of 3060 648 cmd.exe 36 PID 648 wrote to memory of 3060 648 cmd.exe 36 PID 648 wrote to memory of 3060 648 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6b24d98d7a70d7137d0ffe9e7d162d3b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "chcp 65001 && ipconfig | findstr /i "Default Gateway""3⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2248
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig4⤵
- Gathers network information
PID:1248
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "Default Gateway"4⤵PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "@chcp 65001 1>nul"3⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5d60c062852ddf6117ab9764dec4bc50d
SHA1ce0637360d658fc9c21078a5199a685c913a28ef
SHA2569a77ab2c8bfee75f572b22bff1ace6a0e96d6c2969f38164b541b4266a35773b
SHA5123f3a3700d9d651ea92ae13e35d744f12e0b2b55b11ea8d811826f246d9c2e1846a96bd7e4095ed4a74c319f6b03164909a7f5d2e1b20b193c37e3eaf34a33979
-
Filesize
10KB
MD5c9cd927ab77f219b74c29c9ced9d4a87
SHA11d7b80b587ef3d9d75c038adb8269867d6541b8e
SHA256cb0667a3366ab483055376a94bcc551545333def8461db49eb18559ad4473855
SHA512bab749d894d067721c5683bcbeb6821736b9123570dc4d63e57b9518f921b237308fdadb3b09609c54c231e13aa409807ee9fdc3150c554c54a48a584e383d65
-
Filesize
11KB
MD5d26d006c35e1f37c8aca392787521b4f
SHA1dc236ddda7c37601809a879ea3b378b981fafa18
SHA256e6b6959b7104b86d80c47e0d538077d8705043431ec4dae61471543533e16fa4
SHA51217342df284fe2b5e8464f11844404373cf9a2432aaf5d1facafd3414d5e0b4a910c0bc9f2c76e93c3201642f35e2f74cbf2ef475534b82772aa8f05cbec2d22e
-
Filesize
11KB
MD537424ff388c6236fee06022a44fd3bf9
SHA10b3e463387b5d85f92df510d872870b36f094dc1
SHA256fce59443a5468b292100e19c30d093db33f1db5c032a265af0944df388dc62ad
SHA5120d284c9eeb67ebebe6417d5466533541a4c7f4c80bd5830faf0e965d14eef08f282bfc8926949f2822354c0048ca92c81bd5ee0afaacba27bffa54c41cfb203c
-
Filesize
9KB
MD57d3a38202eb74897b45517bdaf7f5df8
SHA14ce9972e88d869443ebf652ba02810d0108af018
SHA25645d7aef129db43a587b864f9c9304969b4089579ce91ad4bb762820196418613
SHA51269b433190f34659f147aee78d15827a3b2bf1f9db94f098ad33e3c9198f6a0d8203147e12988edf4dd9fc167de9ec38b96e0249a6efb094f860a16f4cae2ff36
-
Filesize
10KB
MD52716f30aae6e61c5728335e761b03e15
SHA13b7e7baf9568df978a8fe50d0a64bb018edf3cd2
SHA2567cfef91bc4aae67ad950f47a1a8d1a8115f847cc46dc0ea56c10474d1d0da526
SHA5126111a84775478c7328e4c5cd09247ee88130169e874752037fedbe8bf5c13e240d06e2ba73a6084a305d04bd53780685c1ce1cf276889879088dafa739ca179e
-
Filesize
12KB
MD5cff635c9741de02fbfb67f6573656f97
SHA1ea4d1b8caf0b256ef8a7cab851983f83e7469ddf
SHA256348769735464ac70e704fdf26dbd21e1824915068009394af9ac009aaa61d71c
SHA512577fbb7a5f25fbd6169d1a621298b45037a617d22d9d6276948a2a492b3828b04d9f9207a3877ff07cc22c17abb7b3641c0905c57db08e8e240e05c1ba8cad43
-
Filesize
13KB
MD546c9511f9378443d27515c841f52f008
SHA13a0146d09728b568e3a5df457cba3c6a5bb23212
SHA256d5da3c23f2ef52d5ee5d0e9aabbe18cc431b11b3afa79a0904d76cf0d6f6cb61
SHA512e486c85466d1e4cabce5bc801430828075f5a65e086036fa12dc0e4339a3b340e210f09bde46e33fe32761bc4e3b53933bb7a1397d87f4645a6aa7521a5b2d3f
-
Filesize
16KB
MD5ec921e4643d772c5a9a467f2a9a46095
SHA1616365f005d03788f2ae11ac96e877809cd87873
SHA256b74659a6adef11d616fee20ed2847ff9e8fc1452cd9fb2f700d53f8e856fb21b
SHA5126b8e6df8f76ea1d9e882aeda84a486169a9b6e61eb63092c3814d1a7a79b3e145452c1ddd20ea7dcf296061b6c2c04be95d11129f4fb5faa71fc9d998ddd4d96
-
Filesize
18KB
MD529a866c635f166ef873b94b43acd31bf
SHA1065a7bb0f0a406c8ef6b951c3a9d9e1a3592ddf7
SHA25641866eb7cc3b799f195663d1fdbc221ffda57c429f2c1295c890cfea222136fe
SHA51205d9cf0861f1f332fb38bd39810d507d60f7e917844938bfbd9685bbf6b53c0a3c2243d7cfb7e31b6737e10aaf433a30009d5f29025ca16714c0c1bb2af6ee64
-
Filesize
11KB
MD5ec4b0411a98a94e12bc2e8c729cddc0f
SHA180a61a11991d74d75c177768559cb27ed3bcc89b
SHA256a10093fe094c116e5ffba5654b496c94ae23024d496550d1dbb4c94026d55213
SHA5128813bf3ee4542cbc9b624ada7c7dce2910dad7eb1f6392615f280cf3eba9b604a852a3d590932a64ee163a4df5888390dda7748aa25acbcda657dc1fee6001cd
-
Filesize
11KB
MD560a497f14b8f190946da4d5c81b3bcd4
SHA1146fcdd6cc327bf5fb1b217b790612b9f062b5df
SHA256e4fd3408aa9ab27c5e037810fc8a205afcac6bf6d47f3cbd943c9bb970887e80
SHA5128b8054b45596c52739cd15e1c1cafdce65e3029b94c46b799aa84b1829d415505eeafbbb419ad58c86994ae861d06e14c33d01fd639fb896a1720730dc8aa63b
-
Filesize
9KB
MD52d1d97b17db245ae2484665da97eccd8
SHA18f6d3bb0f6118ed16656b483aba4d390860f9118
SHA256e02fa519c15ca5da2891948277c9c493ae122e4c43cce26e836e4f8823bd5148
SHA51242cd7ad1acbb215701bb023caab6efe647d7beff27786714d68c717334d57c3f4f6fe99d5ccbaa8842504ab7498bf4643fde455b11ccc8358e1fb4cebc35fbc0
-
Filesize
9KB
MD5b107121f6ac9bf1b3111952a374c336b
SHA1e95011395716c888c760bbef97a186d8aceab15e
SHA256c395d1a3adf7c2d18b3fd4973fe4921efcb70a99f4187a769736641400b5fb09
SHA5128e09e8f093300dc3f789fcbc442a32832ffe6838a616e556cc40e1ca487af3761c116d9710a24b85eac019fa0180b162c6f04c64cfbaa54e154a1a91131d4b41
-
Filesize
81KB
MD52ebf45da71bd8ef910a7ece7e4647173
SHA14ecc9c2d4abe2180d345f72c65758ef4791d6f06
SHA256cf39e1e81f57f42f4d60abc1d30ecf7d773e576157aa88bbc1d672bf5ad9bb8b
SHA512a5d3626553731f7dc70f63d086bd9367ea2c06ad8671e2578e1340af4c44189ecb46a51c88d64a4b082ce68160390c3f8d580dde3984cd254a408f1ef5b28457
-
Filesize
76KB
MD52002b2cc8f20ac05de6de7772e18f6a7
SHA1b24339e18e8fa41f9f33005a328711f0a1f0f42d
SHA256645665cf3338e7665e314f53fbbcb3c5d9174e90f3bf65ddbdc9c0cb24a5d40d
SHA512253d0c005758fcb9e0980a01016a34073e7cdffb6253a2ba3d65a2bb82764638f4bd63d3f91a24effd5db60db59a8d28155e7d6892d5cc77c686f74bf0b05d0a
-
Filesize
113KB
MD5c827a20fc5f1f4e0ef9431f29ebf03b4
SHA1ee36cb853d79b0ba6b4e99b1ef2fbae840c5489d
SHA256d500cff28678eced1fc4b3aeabecc0f3b30de735fdefe90855536bc29fc2cb4d
SHA512d40b816cde6bdf6e46c379674c76f0991268bd1617b96a4e4f944b80e12692ce410e67e006b50b6a8cfaef96aacc6cb806280bac3aa18ee8690669702d01065c
-
Filesize
154KB
MD538c434afb2a885a95999903977dc3624
SHA157557e7d8de16d5a83598b00a854c1dde952ca19
SHA256bfe6e288b2d93905f5cbb6d74e9c0fc37145b9225db6d1f00c0f69eb45afd051
SHA5123e59b79c47cb022d7acec0af164c0225cd83588d5e7f8ca3e8a5dfae27510646391a1b08d86d5ee0b39d1b6bf08409d3758488df3c8cc4d458bed9faab7686e8
-
Filesize
168KB
MD5d155764d81644a8e5781505273f90606
SHA1faacfd1921dda1c4e53b3dba847a2886a4c93271
SHA256a4fa29acd2a159b81062c2090d6464d2d6ad98880afe76df3249e75e6c890cfd
SHA5125ce8ee2ab8e220ed70eccf06d17030e77cea3ee8b5d0c2617210870dad6b7e9b48e34a4ea2efc4af4f75d7e14d6b2ec7999e88eb6328974ea4b02f7afb778aef
-
Filesize
67KB
MD549848ca2c6ed629a5fa24abab96e5ec9
SHA1f69fc2f07a80ef7883319676b9c5c92d28aad57e
SHA256c222806d471a71d0fd804162e5da3dc607973367819453c20119a5742eff5113
SHA512f895354f7f0c573d32dbe71bac556a635a858bca4cc37e9495478842335d22494c4b1263b84757bec7854b64b545c8fd8e99e2970bdb0b417502ccdf5ad5130d
-
Filesize
767KB
MD5565c552e8e12659aecda48d1151be260
SHA16732f3f48e5e9ded5148016fd07e1fed1c8d748c
SHA256266178c3a7cc219aab20b42b52f849ba7a7419bbf7767e24c417a4d397f8dc99
SHA512a9a16c69543353b32433806b4fbd075e73f7a176c8e64ded5ca711b5503eff816075826784cec0f61824f1ec8eed001e3434a74c91cea3811e9697d20fde3adc
-
Filesize
2.1MB
MD5aad424a6a0ae6d6e7d4c50a1d96a17fc
SHA14336017ae32a48315afe1b10ff14d6159c7923bc
SHA2563a2dba6098e77e36a9d20c647349a478cb0149020f909665d209f548dfa71377
SHA512aa4b74b7971cb774e4ae847a226cae9d125fadc7cde4f997b7564dff4d71b590dcbc06a7103451b72b2afe3517ab46d3be099c3620c3d591ccbd1839f0e8f94a
-
Filesize
525KB
MD5697766aba55f44bbd896cbd091a72b55
SHA1d36492be46ea63ce784e4c1b0103ba21214a76fb
SHA25644a228b3646eb3575abd5cbcb079e018de11ca6b838a29e4391893de69e0cf4b
SHA512206957347540f1356d805bf4a2d062927e190481aadc105c3012e69623149850a846503fca30fc38298f74d7f8f69761fddd0aa7f5e31fedb1fa5e5c9de56e9d
-
Filesize
3.9MB
MD5c512c6ea9f12847d991ceed6d94bc871
SHA152e1ef51674f382263b4d822b8ffa5737755f7e7
SHA25679545f4f3a658865f510ab7df96516f660e6e18fe12cadaaec3002b51fc29ef6
SHA512e023a353d6f0267f367276344df5f2fdbc208f916ca87fa5b4310ea7edcac0a24837c23ab671fb4b15b109915dfd0e57fbe07593a764b3219312ed5737052822
-
Filesize
112KB
MD59b2b48dc92f9a7b7c8789622d064844d
SHA17fc406e800fbbaaf497682100af43201aac2e66a
SHA256cf529d3df87b26a3c10b991f9cd2c7adc52dc493829e11ac3483ba1a02d04ed0
SHA51246cf1f2f29a0fd5d4a24d69deb95ffb5761a7f3c662c9ae715444962b2dbd41b71a79d7ad77f582b4e532f47967597799faf423cdbf495ed82837ce44261ffa7
-
Filesize
23KB
MD5441299529d0542d828bafe9ac69c4197
SHA1da31b9afb68ba6e2d40bbc8e1e25980c2afeb1b3
SHA256973f851dfaf98617b3eb6fa38befeb7ede49bd993408917e207dc7ea399de326
SHA5129f0fb359a4291d47b8dc0ec789c319637dde0f09e59408c4d7fd9265e51c978aa3ba7ea51ca9524833814bca9e7978d9817658655ee339191634d4ae5f426ddc
-
Filesize
1.1MB
MD544d7761c17b599f75c41bbf393eea3b1
SHA1be23173eb5d6fb15a768cd2db2de1c45a84be888
SHA25672045a1cbe25e35d8b8c3df1349c28137525c63ff5fc7e423af87940434f4cf1
SHA512ec830ac8477902bbce50cc693d9dd1715a27b01ea4875399d5a9190e4d690dafe8dcfd4368393ebec8709389890832175048c332c555222ef12c316d4f2fe1d3
-
Filesize
171KB
MD5f336b35d954edd362b2200cb3be87cac
SHA125f6f43c8559b1fe17331cd994680897099c958a
SHA25630ef14c26a1f385ca2bf7dbd59a4533e5c9d6faa1dc8c2f4a656e357f7e2b133
SHA5121e7296d1c6cb8afc428ee25b7832891ec5f9677681c5173928621229afc123be8447a8016f365e529b1df4f9a0d94d972cdcd32970eac8eb8a9f5f64daefbbc9
-
Filesize
10KB
MD57695ed34741115274c06c9b1c049c094
SHA120900163c4c3ea9e037c4975a0056a4899c8296f
SHA25626bd93273ed7c011727973a0e0759559397b354eb15b1cc56a9ea27771d9903d
SHA512901676b7f9f2253fbbba883decfa967f3220388915f2e04c886106561d7ba7ffcd361b149dfcc6379a4e98c7be781fc656692e41231c2d6a68e8b664d0965d0c
-
Filesize
37KB
MD5f9799b167c3e4ffee4629b4a4e2606f2
SHA137619858375b684e63bffb1b82cd8218a7b8d93d
SHA25602dd924d4ebfbb8b5b0b66b6e6bb2388fccdad64d0493854a5443018ad5d1543
SHA5121f273bb5d5d61970143b94696b14887faa5ed1d50742eccec32dbd87446d696ff683053542c3be13d6c00597e3631eb1366abb6f145d8cc14d653d542893001b
-
Filesize
67KB
MD56b59705d8ac80437dd81260443912532
SHA1d206d9974167eb60fb201f2b5bf9534167f9fb08
SHA25662ed631a6ad09e96b4b6f4566c2afc710b3493795edee4cc14a9c9de88230648
SHA512fa44386b9a305a1221ed79e1ca6d7edf7a8e288836b77cdca8793c82ebf74a0f28a3fc7ae49e14e87029642d81773d960c160c8b3bcb73e8a4ec9a2fd1cdc7fd
-
Filesize
139KB
MD5e28ee2be9b3a27371685fbe8998e78f1
SHA1fa01c1c07a206082ef7bf637be4ce163ff99e4ac
SHA25680041ce67e372f1b44b501334590c659154870286d423c19f005382039b79476
SHA512708e4069bafa9c5fb0d324e60cc81b1a3a442113f84a4e832a97b4196bee0a4a91f2e13239c91757512e1b42bb23166360ad44a5dce68316799aafc91e5bba04
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b