Analysis
-
max time kernel
150s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 23:55
Behavioral task
behavioral1
Sample
0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
0477c3037164924dea29a1a930f3ef90
-
SHA1
202deec08cecd0f4d1148a0e96c244da75bb9b8b
-
SHA256
d893c67791b97ddccc765bdb90b19041d518a5ba2793057169dd480e68a6b74a
-
SHA512
912370efab3bda758a02a00328829b1d5129ff6f9c255ffab8c18d2254b87a34bf8143ede276fef6749e4197096cb9732bf5daa8f8faecc1760122d96821c0e4
-
SSDEEP
49152:4oacvNZ+7u5X6wgT5YHNaJqDK5FaioabBrkmIdgqFjFtmaAAjp:9Z4u5KwS5GNaJqDKjaiLbBrMNFtmaAAN
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\Hosts 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Loads dropped DLL 23 IoCs
pid Process 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\superecVL7sg.sys 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe File created C:\Windows\SysWOW64\superec2vArr.sys 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe File created C:\Windows\SysWOW64\ESPI11.dll 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Prefetch\360trsy.Dat 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe File created C:\WINDOWS\Prefetch\ZJZHook.dll 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: 33 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe 4648 0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0477c3037164924dea29a1a930f3ef90_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57e81a79f38695e467a49ee41dd24146d
SHA1035e110c36bf3072525b05394f73d1ba54d0d316
SHA256a705d1e0916a79b0d6e60c41a9ce301ed95b3fc00e927f940ab27061c208a536
SHA51253c5f2f2b9ad8b555f9ae6644941cf2016108e803ea6ab2c7418e31e66874dea5a2bc04be0fa9766e7206617879520e730e9e3e0de136bae886c2e786082d622
-
Filesize
96KB
MD56cdb86e0200849f6ad365a36b2c0e5a7
SHA1b037180c1624f6f6cbaa2b73abc1d50a49ecfeb8
SHA2565925038dc68aea5e9ef509bc05d26d9c9c170c868843076fa2d4f0021a99f74b
SHA51217b41bf8616b8244261d7978a8d2501bf5bf87770895c0c26c96bf7dd5f1b94b2de864b0728ccd101b67ad3f444a77550dd315e535a4975dc543090793d6df0a
-
Filesize
212KB
MD54c9e8f81bf741a61915d0d4fc49d595e
SHA1d033008b3a0e5d3fc8876e0423ee5509ecb3897c
SHA256951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129
SHA512cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7
-
Filesize
36KB
MD5ae663d23828e2c0873fb294a8a2a21d1
SHA12edd95515215170f2e5dc2428ac631b5aa2ab681
SHA25621970bccf9c8dd23cbf36b5f5bca9e6bc32335bcfb5e19d2f97a1b2ee2eefa96
SHA51270225619899266d7a307f6eeab2f4c709f48b66c57a2266143c787b984209d454634daaaf9165025e850fc3de8e10a968b900c80d89389ef848551b0701ef311
-
Filesize
328KB
MD5cbd788f4c71b9776660d6e8473ae0e09
SHA10189cd47bfa5d1cac0d7f1a33953d279f60b02bf
SHA256db0a6d7b75503daaf93c8e62ce67abd3afd57daaef4a448ec25a43d1de69e47e
SHA51284bc02c67e3a3a9f77418b25afe7ec55e5bb5ca5a6c05503d94dffa57a30c7608e79bb4f83fe91c39ccce16872df2b3f9e7e5a8eafb4f563b1f961b93e9b8c94
-
Filesize
156KB
MD5ca08022deda03a89eb0f3232b265bca6
SHA129a3585b6c524a28fd272214691b65a48b7027b1
SHA25600a98605d8ee60639c8de56862a50f1adf3f83e265ab636f98c017b719b013bf
SHA51265587c3c0a3d0feaf1aa7c676626ae0a8bd158595af4e855cf7588ef8a831903350a756dd2f8010dda10173abdb1418751e92c509c6b74a3b829465ab5030c15
-
Filesize
216KB
MD5cba933625bfa502fc4a1d9f34e1e4473
SHA15319194388c0e53321f99f1541b97af191999a09
SHA25625549c7781b3f1b92e73b0ea721d177207cce914a66f3229a71291f2eb160013
SHA512f5fb4b97c4f68a20e0847e6528740ce659c4501726f3b2dff1ac83e88a3b7198099da03edb0f069cd4af7ed568a2373597b235cd239895addfa5226d3a444142
-
Filesize
460KB
MD56eb20bb6cafd6d31e871ed3abd65a59c
SHA1ae6495ea4241bcde20e415f2940313785a4a10d2
SHA2562b3fe250f07229eaa58d1bc0c4ac103ba69ad622c27410151ce1d6d46a174bae
SHA512562edc1f058bc280333a6659fceb5a51b3a40bea7aca87db09b0cc1ca1966f26f2a7e4760b944e2502e20257544f85cf9c32f583f1dec06271a35dcfb8fa90f4
-
Filesize
192KB
MD50503d44bada9a0c7138b3f7d3ab90693
SHA1c4ea03151eeedd1c84beaa06e73faa9c1e9574fc
SHA2567c077b6806738e62a9c2e38cc2ffefefd362049e3780b06a862210f1350d003e
SHA512f14dfa273b514753312e1dfc873ac501d6aa7bbd17cd63d16f3bcb9caddcb5ea349c072e73448a2beb3b1010c674be9c8ad22257d8c7b65a3a05e77e69d3b7a8
-
Filesize
1.1MB
MD5638e737b2293cf7b1f14c0b4fb1f3289
SHA1f8e2223348433b992a8c42c4a7a9fb4b5c1158bc
SHA256baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b
SHA5124d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12
-
Filesize
48KB
MD537a58e1c5ce48e401ee8dd1d1da54814
SHA1a87d00d78838c2d968b72330ee6f21f69b2caae5
SHA2561c426928fb90bedb31fcffa0f3fbe7bdbca4259f93f5abdefed6a9a089f2982c
SHA512e85052fc305040bdcaf47262e0ce6eef0848b319baac72a076dc94e7d20ea7ad8fbdd7d5381606a3154ab84fe81429bb339123ac1cd94551b1dc9cecfb7a08bf
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc