Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe
-
Size
5.6MB
-
MD5
43a7a2655320401aaad30483edba35d2
-
SHA1
45e8c8428885ae50835da8cd4d8050ad54cafd66
-
SHA256
d3bd0a1c368d2becee9b7c3586c6c81f9318e4f985368f254a016a43a35c0a0b
-
SHA512
145dd10ae2a24969b273362da91c42876b40043083d142a48faae8df6d8e5a0d55adc3efb5a8d388dc923594a0a7a4980a694f125036e3b6e508be0a4ec86df8
-
SSDEEP
98304:+BexMKy9uEEytMBR7Vao60gT9PyrqHBcPViPCTlPnOMjTTW4wtQnbYTNPNeB35Em:+BHEWSR7Yo6DZauhonCQnbYTyX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2960 Setup.exe 2228 IKernel.exe 2668 IKernel.exe 2092 iKernel.exe -
Loads dropped DLL 26 IoCs
pid Process 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 2960 Setup.exe 2960 Setup.exe 2960 Setup.exe 2960 Setup.exe 2228 IKernel.exe 2228 IKernel.exe 2228 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2092 iKernel.exe 2092 iKernel.exe 2092 iKernel.exe 2668 IKernel.exe 2960 Setup.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe 2668 IKernel.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\temp.000 Setup.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\corecomp.ini IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe Setup.exe File created C:\Program Files (x86)\Common Files\InstallShield\IScript\iscr628a.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\obje623c.rra IKernel.exe File opened for modification C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor61fe.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\core61fe.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuse625b.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll IKernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54DADAB2-28A6-11D3-88BA-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6494206F-23EA-11D3-88B0-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0C8D0880-1AC4-11D3-A8FF-00105A088FAC} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{15F051E6-59A9-11D3-A25D-06D730000000}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.LogServices iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2068-CB55-11D2-8094-00104B1F9838}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8C3C1B12-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B15A454-9067-4878-B10E-B9DFFE03049D}\ = "ISetupLogDB2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65D37452-0EBB-11D3-887B-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{27D2CF3C-D5B0-11D2-8094-00104B1F9838}\1.0\0 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptEngine.1\ = "InstallShield Script Engine" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\ = "ISetupFeatureLogs" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE6115A1-7DE5-48DC-AD2A-25060E00FCE2}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA7E2086-CB55-11D2-8094-00104B1F9838} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{94F4A332-A2AE-11D3-8378-00C04F59FBE9}\ = "ISetupMainWindow2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{39040274-3D36-11D3-88EE-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65D37452-0EBB-11D3-887B-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B1B8830-C559-11D3-B289-00C04F59FBE9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B697780-DBBC-11D2-80C7-00104B1F6CEA}\NumMethods\ = "5" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.LogServices.1 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\ = "ISetupObjects" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DED1EA29-3F89-11D3-BBB9-00105A1F0D68}\1.0\0\win32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2067-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DED1EA29-3F89-11D3-BBB9-00105A1F0D68}\1.0\FLAGS\ = "0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptObjectWrapper.1\CLSID IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}\1.0\HELPDIR IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{91814EC0-B5F0-11D2-80B9-00104B1F6CEA}\VersionIndependentProgID\ = "Setup.Kernel" iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{22D84EC7-E201-4432-B3ED-A9DCA3604594}\ProgID iKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3EE77D8B-40C1-4A2A-9B77-421907F02058}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7D795704-435D-11D3-88FF-00C04F72F303} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.ScriptDriverWrapper.1 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{80FDE82A-2CAA-11D3-88C3-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Kernel\CLSID\ = "{91814EC0-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{91814EC3-B5F0-11D2-80B9-00104B1F6CEA}\ = "ISetupComponent" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{15F051E6-59A9-11D3-A25D-06D730000000}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2068-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3EDC2C10-66FE-11D3-A90F-00105A088FAC}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7D06080-238B-11D3-80D7-00104B1F6CEA}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\IScript\\iscript.dll" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EDE94BF2-4FB9-11D5-ABAB-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DED5FEEC-225A-11D3-88AA-00C04F72F303}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{80FDE82A-2CAA-11D3-88C3-00C04F72F303}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{348440B0-C79A-11D3-B28B-00C04F59FBE9}\ = "ISetupShell2" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0C8D0880-1AC4-11D3-A8FF-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0C8D0880-1AC4-11D3-A8FF-00105A088FAC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2069-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}\1.0 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8415DDF9-1C1D-11D3-889D-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AF57A6F1-4101-11D3-88F6-00C04F72F303}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2067-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3EDC2C10-66FE-11D3-A90F-00105A088FAC}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDF8B49D-16D0-49A5-B133-ABE7DCC23DAF}\TypeLib\ = "{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2068-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91814EC5-B5F0-11D2-80B9-00104B1F6CEA}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2583251F-0A04-11D3-886B-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E1B9357F-24B9-11D3-88B2-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{39040274-3D36-11D3-88EE-00C04F72F303}\ = "ISetupReboot" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0C8D0880-1AC4-11D3-A8FF-00105A088FAC}\ProxyStubClsid32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B1B8830-C559-11D3-B289-00C04F59FBE9}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.User.1\ = "InstallShield setup user interafce" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{112EB4F0-5A48-11D3-A90A-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D8B6331-D8B1-11D2-80C5-00104B1F6CEA}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA} IKernel.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 1592 wrote to memory of 2960 1592 43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2960 wrote to memory of 2228 2960 Setup.exe 30 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32 PID 2668 wrote to memory of 2092 2668 IKernel.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43a7a2655320401aaad30483edba35d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\pft4433~tmp\Disk1\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2228
-
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD562d5f9827d867eb3e4ab9e6b338348a1
SHA1828e72f9c845b1c0865badaef40d63fb36447293
SHA2565214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5
SHA512b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732
-
Filesize
336KB
MD54d63bbff28afc7a69b6defaf048306a7
SHA18e8a6fb997051e7e4bc9b32be517f40e4c8ecd9b
SHA2564eb9a6a4c0b1147290c74d2160533e49e043335255be9a60b6c83638d83e5590
SHA512251e3782bd481564a52729386df31f338a9ae1d80123e222684c9e753dd0c8c3106e98d9fa5d2874ff6345182f1909ae1b7864716d5632d42ca91bf94422ff65
-
Filesize
600KB
MD57d3e7cf4f3bba53b37c84698bfc118e1
SHA1fc9e6493f4ef7268b85cf345fa4df3b7a18a25a1
SHA25619133b2306544cbabf0b42b0ee1f5889ddfd482973ae8bdd1e3a04e4f62d7fdc
SHA512d5c74b5fed48da280180ab0800a8797498e4bc35ffa1d3eaef347734657bc98bf7b66ae16be0d55b5d03e369f1e0c3915a6c0aa924edc864db8ba18cb2c8b6e1
-
Filesize
417B
MD5098355ad34f9618d62b45f0e6df3bb15
SHA18746a1a0d1f65cb4ed767e93d17f102e69d24a44
SHA25676c9b79f9243b312a9017aa087615a667eb4c7e530630877015fa0d3505800ac
SHA5122ed4b1255a13c346fe0ca393172d84e0c2a3691b45fdfe85c8e16abaf4ae84af541bd23ade60cac28cc5e69c6a5f2081dffa2b25e328150ccdf02e3a2e33ea59
-
Filesize
171B
MD527f9eeea8b4a64c76ba3adfef515c6ab
SHA1c28df725056e5215a2b958205402227dc5ff01dd
SHA256262f122acec43ada6bbf3d7b9e1df68e8ca468f3420f4c0d5967631eba1f78ed
SHA5125d7dbca1cc14cf6c533f4788e89e4abfa406a366c9449122b8fd071b0d818e9ee9dd47d5d18fad978c7cfede8303eefa46a2ca4c36a2f46a525af44a664245e0
-
Filesize
128KB
MD579bb60f5943eb3107a75ff87b0eb0e05
SHA1fc56a0e68e14e3f407b49a3adb6930dce2940fde
SHA2561256c566cca0f5ff4d91f169d3b8faa4eaedfc1bfed67775894b317ceee88f52
SHA512426d439117a17df7512804cff14bbe3aea1d54bdac5e75bf2864a47dbd880ad2d0ea091fa059b9330c6d229dbc4a94b7daaa12e07f42f78493edd589d9ceb2f6
-
Filesize
5.4MB
MD52cec4675385f1ce32a2d2d97d8ade455
SHA1051f09cba543ae42607bdfed0496de2362a5c38b
SHA25680433bee5231e5646bec1d2904db1fd5bafd5068d060d2b63cc2d0fe89a9bd7c
SHA512ad8ee28ad73bdc0535bd2a9a968b09ed3ef8a3d2a8dce18067c17bea658f6c4885de17691c0be26a89e80e7518bac3bdd3735ae9a36869627de38cfaa57ef9a7
-
Filesize
4KB
MD519a2283172165182d05bbd5745372f62
SHA14cd50813878acf10fd5164c814d0692280c773e1
SHA256379addfc2e4a0309ec0526507d564fc79eeb6635963c0e84f10cb8b103036c54
SHA512b14f8f6efcc6d3395ab41c5eab22a2c1201f760627f40929e8575aa9c16092ace0370f4248e9b6a7ef2cf74ae53d4e9e5f8cb42253fe0a5b2c61a4bce72abeb5
-
Filesize
17KB
MD5d660d3890fbf751e2fe4234e27f085bd
SHA17458138624e3009b4402dbe8163fc345c99fe97a
SHA2568a8a3b2f2a88846b9e75040ac965a4379d019e57e6bcff2f3f344b595a342d4e
SHA5126269bfe9128b93306d2042094bca6716dec218645b5a4c70f9e3d7af40b8fdb375cb1a8d0f97b195112d2bd5b68b112f3f49a21370feeddde762fd365afb8392
-
Filesize
596KB
MD5bf25eb6a1e0aa2fff0cb190270b95418
SHA179cad1291ac8b042af8454328ef7c71ce04a7c9d
SHA2564535320c5b9596a6210109f68c647dbdbd0289ba63286fd389dea910855491f1
SHA51266a4ee419548e63c0a007be91ad58d5e1a6cf37e5df70a5da7ddcc0a1f4831bb42ba67c6cc8ce3d54b99fa77a9249ace9b5cc4836e957103b9901484bb04337b
-
Filesize
76KB
MD5003a6c011aac993bcde8c860988ce49b
SHA16d39d650dfa5ded45c4e0cb17b986893061104a7
SHA256590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a
SHA512032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7
-
Filesize
172KB
MD5377765fd4de3912c0f814ee9f182feda
SHA1a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1
SHA2568efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb
SHA51231befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710
-
Filesize
32KB
MD58f02b204853939f8aefe6b07b283be9a
SHA1c161b9374e67d5fa3066ea03fc861cc0023eb3cc
SHA25632c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998
SHA5128df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59
-
Filesize
220KB
MD5b2f7e6dc7e4aae3147fbfc74a2ddb365
SHA1716301112706e93f85977d79f0e8f18f17fb32a7
SHA2564f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1
SHA512e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83
-
Filesize
163KB
MD56911bc3432dfaf16063f6c2af5eb4b52
SHA194e77684fe200b189061207b5fd042bb22d2f37d
SHA256ad22c57908918f70864634b2580cb57237dbd1031f6f7a662f7644cfe0b57528
SHA5126702cba5a3d05637017a76812970e32701d3a96b84e95819b633426495eb98ccfc1254753d49525a3e20ebddd2ae23b1df495139ffc6aeb697e772efdd045f3a
-
Filesize
212KB
MD537554142e54a38de6d2142ba80353f0f
SHA16fb0102aa862674169cb7f506ee185ad5299ff19
SHA2560888d2a696ca222ebc35641502548e5b79b55c9f7c094466a1a52d9d4d429a64
SHA5121b3c16d792993569999e0e8271daa4165e29400942e21bcd73423c8d517144aa487d906ef593c7bc67c5877ba3fc098f25386170ddebedf8156f87adc947b181
-
Filesize
316KB
MD513b70633df1bf63e19fe4a74a53b8896
SHA1f542f67cc15002f76f3ab9230297ccca2461c009
SHA2567f852b5ee852ae2870d63db4d9cac454e08e93104d18bf5c9efc068d85c35147
SHA5125fe27c41fb5de0ae2373295d0f5b13be7d863161e94d29bbeddb84acab4300a9bc93482c80f874ccaa9fa20b2066d7824c530ac3f4575bb999da3f594ccd4a2b