Analysis
-
max time kernel
13s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 04:07
Behavioral task
behavioral1
Sample
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
-
Size
404KB
-
MD5
210619e23f9680333393f28461f093d6
-
SHA1
2425077adfacabb570fc6e717f987f9d8e8c5ff7
-
SHA256
cc16d24d1d6b7c806908c6f16ac3827c1d352e4c0c05e4ad47a391746688562a
-
SHA512
c12ffe1c465b8884cfc816e6b6e10fdc1a3dcdb419cf2c7643eba69416005d019f4b43084625ae36fc51e2ce3e4c8929e0aaa129c1bcbb61604de9f201837715
-
SSDEEP
6144:kTnjnvrM3mjHGh5Doh9Z5cAea4Jv81E66Hwc2Fq4t:kHn438Hwerea2vEEFz2F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe SCVVHSOT.exe" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Loads dropped DLL 1 IoCs
pid Process 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1444-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/files/0x0007000000023570-13.dat upx behavioral2/memory/1444-52-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-53-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-63-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-112-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-113-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-114-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-115-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-116-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1444-117-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\SCVVHSOT.exe" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 29 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\v: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\G: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\g: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\n: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\r: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\J: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\E: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\j: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\l: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\q: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\i: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\t: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\u: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\y: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\H: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\x: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\I: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\z: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\b: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\e: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\m: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\s: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\w: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\p: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\K: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\a: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\h: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\k: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\wd273296.dll 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\setting.ini 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\wd273296.dl_ 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\blastclnnn.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\setting.ini 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1740 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 84 PID 1444 wrote to memory of 1740 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 84 PID 1444 wrote to memory of 1740 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 84 PID 1740 wrote to memory of 4236 1740 cmd.exe 86 PID 1740 wrote to memory of 4236 1740 cmd.exe 86 PID 1740 wrote to memory of 4236 1740 cmd.exe 86 PID 1444 wrote to memory of 3192 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 87 PID 1444 wrote to memory of 3192 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 87 PID 1444 wrote to memory of 3192 1444 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 87 PID 3192 wrote to memory of 5096 3192 cmd.exe 89 PID 3192 wrote to memory of 5096 3192 cmd.exe 89 PID 3192 wrote to memory of 5096 3192 cmd.exe 89 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\210619e23f9680333393f28461f093d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\210619e23f9680333393f28461f093d6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\~c8c9b192.tmp"C:\Users\Admin\AppData\Local\Temp\~c8c9b192.tmp"2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\~ba723265.tmp"C:\Users\Admin\AppData\Local\Temp\~ba723265.tmp"2⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\~8f6b9092.tmp"C:\Users\Admin\AppData\Local\Temp\~8f6b9092.tmp"2⤵PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\~e578f7e.tmp"C:\Users\Admin\AppData\Local\Temp\~e578f7e.tmp"2⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\~f3d096f9.tmp"C:\Users\Admin\AppData\Local\Temp\~f3d096f9.tmp"2⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\~9dc33e91.tmp"C:\Users\Admin\AppData\Local\Temp\~9dc33e91.tmp"2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\~e57922e.tmp"C:\Users\Admin\AppData\Local\Temp\~e57922e.tmp"2⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\~ba727cfe.tmp"C:\Users\Admin\AppData\Local\Temp\~ba727cfe.tmp"2⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\~e5794ae.tmp"C:\Users\Admin\AppData\Local\Temp\~e5794ae.tmp"2⤵PID:4488
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5e2f052c70379092832aab59bcc2b4aae
SHA1e06e3f365b9048bd9cc37bdfa354fd24301da116
SHA25666cd965807debd54677f3bc9e87aecda2cebc98bd144241024c3dd2e75d94768
SHA5123c5dbfb3e1d90c200e9764aec8c958ff845d49b9cfc1acd04ea07c901a6ab196dece13ef61a1e5c1c16611a391bb82e12279a2a042ae1c72c20704eadc411d95
-
Filesize
66KB
MD52a159b294729a83e51c8ea8f302b360c
SHA19c0e4bcb3cd71895c2f7ec326d97e272cec65234
SHA256bde95a1cbc3f1d278d45756adf54eb1d2e8bea4f23dccdee1a472af029c6e6cf
SHA51287537e800a0e29cb405927b38e0be5c25a77f85f22ef5237622f123281dfcfb21330ff0b15155db054297ebf70e2c5b42350061427faa07b0bafb56467f286b9
-
Filesize
66KB
MD5d7b73fe52da6153feaaf5768afa9970e
SHA1ef5f9a471d6111bfdc4fb1b8ae39861e8b0a7096
SHA256ab302245670eb116d327f0e1a25bada0e2c9e8bf06655243565508752346e52b
SHA51272593dfb54d1340a9f7f6674f70188a24eb3c77a0d9c0849ed5ab032d482e041d04c41d634b6c26498968907633ab6187b6b9b31c6467bd78b211df10d85e6e3
-
Filesize
66KB
MD5bdaac9626f131537986cc0c8ba80f0f4
SHA1a60a776b6692a7e5ef51886732d3fbc451233bb8
SHA2561b9958510b8e559057f802d34947994a92b2ad78e865527c2b5bc0b96f70c9d6
SHA512c89e65357ac72e2d954e7280c64d972f2f948bac1d94f005058f04d7dc315f70ad99268cbd41d922bcba0265a47d0f4ed8b3071488ce4650226c65cc3ff7b71f
-
Filesize
66KB
MD596366f04a006405f55bb1c71a39355af
SHA1059615fe361e9fb82ce6abbc1eb9d61c6a94473a
SHA256d381ac4c5dc820587f2dfcdd8f70dac5e5fbd9978dfe08b795505b01179fc54f
SHA51266d53092c7de17a7b052da95341e136bd9c8eb015c7d84c5a83f17b63e2bc87da57c298412614eb706b7e79ad617aa3e6e89c0f033fd510f26daa95ae5cd9384
-
Filesize
66KB
MD5286c62bbe3995b523e7f22392cf5aaf4
SHA1f5edf67f8f8ba0661fa8893387ab165cc3f8c756
SHA25655da6ee18b1bf7c562678ff3425f8971f67070bd22811a4472130a9ddfcab8be
SHA512380700237409a325bb695d90cc48b5494056e5265dc895edc4398be2424d537f673c17bc12b2bfe18193e780c520360b86912f4648db4f399939bb5e9a1fd546
-
Filesize
66KB
MD59a42c37287176dc801a119919199b4b4
SHA10d6be4cb500d1a64dbb0146a61716181f3585c6b
SHA256e204ac401c67af54b258ee363c5fd5729c1b349a28cb836f1453c48597607148
SHA5124baadfe1bca8a26fe95981fce0b458257dbf3cfc647b0a377c86ec7aaf66d8b2cd21609bf844b70115ed7f4460908eb790c9df0f14e77b471a093836a1f6a843
-
Filesize
66KB
MD5dcf3f8f6b8c2898eeb8597e166839e19
SHA1b74ff913ddac9fcb27c697b09e9bd7e34035f16c
SHA256200136312e00d58cf3c3fae2222a84213f6bb3ec461dbcc687ba910ae276815d
SHA5127aa884a94f34e67e68a47bd4dc0dbf99ce6859f70171e7c545a7e86f24cfd33e72a86cb2d32f488c055cab940571fa73c5a398314945ccb27169b90cb638f168
-
Filesize
66KB
MD5b86db12761e9bc95b7594007ec2f7cd1
SHA1415388bd0ebe04f6d2cd4b434a6746ca3704d2f5
SHA2565cdca9ab9a5a2a8b56abb194a2f15e6aac2230c84c585da6e83313bb26764f7f
SHA5124836ed8edbfc22894d3956e4b8b22b777a0596f89c7d39197ab91b977937db8a75c6f14b6eb0191e67e5dee5a7106e981e7140ff51ef6d3422c6a95d2b3b8d73
-
Filesize
103B
MD571ba948ec18ea42865d9a953fca1eac3
SHA135d35b1b2ac08f0898b036328f18a96de87ef2b4
SHA256d3d3c8b704a1176512eec636590c78467c9f3873f5fc74820130730af7338e14
SHA5121ac98f09cd05c8798bd54a8db067935efb3fa530fa9d1ef85cd24f88f95e938cf31f1c40676d0be1192b3d32dacd087e76bbf120219acae59b8334c2c671838b
-
Filesize
404KB
MD5210619e23f9680333393f28461f093d6
SHA12425077adfacabb570fc6e717f987f9d8e8c5ff7
SHA256cc16d24d1d6b7c806908c6f16ac3827c1d352e4c0c05e4ad47a391746688562a
SHA512c12ffe1c465b8884cfc816e6b6e10fdc1a3dcdb419cf2c7643eba69416005d019f4b43084625ae36fc51e2ce3e4c8929e0aaa129c1bcbb61604de9f201837715
-
Filesize
143KB
MD59c17ec4f10efbb054839465e7147fc06
SHA15919346a23af198be0e718b091fbb4586e742700
SHA256754f8942347647fc4fbca2de0e17c9ade8446190b7ed7a139df01b5515a7139b
SHA512054c8b9ea40ba12c15ed63c409772ef554c2cf650d96c23cbbb8bdc75ed3ffabe67c00b7e5e9d78b7e235a16353376f02ebf3de9514ad2aaeef34d8f5c071c49
-
Filesize
80KB
MD59b02808f4e0b8a5e71a37949b6db062b
SHA1715e45ad25db0fd7d2c1d856906637fd6467715c
SHA2560c8f585418bce392ecbd330bae9a3535a4d92a2c9283e031024612935641cc30
SHA51291844eb4490713c328704a0e4351fbce976a72136622b21f56fd9ae6f821eb5aa445c61ad07d885e67b126a2e66c3bb73d8e90bc305ffb48c94dcac650c6f415