Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 20:46
Behavioral task
behavioral1
Sample
4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe
-
Size
751KB
-
MD5
4b54addc7de0d729fae86d5900252f38
-
SHA1
8bfc92b3ce03e178724ab5a3fd09d90f00ccbea8
-
SHA256
c488b82554454b75a91d5237200b96a1c56bed5a153345edf6951755455311d8
-
SHA512
558c598b6acd4eaf534cff2b3f56c0b0810a0e729e9796070cb0dc78cfaf491369b2b75acdb2aa276ab914135b7a5cc7eed36781e6716188578d11ce812e5d35
-
SSDEEP
12288:HFLpdclqxA6Bs6UPSPL2KggZs4BLOhXiqnt5tql9BUok0:l1d5xA6mjGpYXiqnt5Om0
Malware Config
Signatures
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1100-31-0x0000000000400000-0x0000000000415000-memory.dmp Nirsoft behavioral2/memory/4884-34-0x0000000000400000-0x0000000000415000-memory.dmp Nirsoft -
Executes dropped EXE 8 IoCs
pid Process 1100 RtkSYUdp.exe 4884 RtkSYUdp.exe 440 RtkSYUdp.exe 2692 RtkSYUdp.exe 1388 RtkSYUdp.exe 4904 RtkSYUdp.exe 4984 RtkSYUdp.exe 1152 RtkSYUdp.exe -
resource yara_rule behavioral2/memory/3888-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/files/0x00070000000234db-27.dat upx behavioral2/memory/1100-30-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1100-31-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4884-33-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4884-34-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1152-61-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/3888-66-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\desktop.ini RtkSYUdp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\TaoBao\ÌÔ±¦.ico 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\TaoBao\СÓÎÏ·.ico 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\TaoBao\ÌÔ±¦.tmp 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\TaoBao\4399СÓÎÏ·.tmp 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\RkRealTech.exe 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe File created C:\Windows\RtkSYUdp.exe 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\internet explorer\version Vector 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellNew regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\LocalizedString = "@shdoclc.dll,-880" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\Open\Command\ = "IEXPLORE.EXE %w%w%w.93%119%15.%c%o%m" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\ShellFolder\ regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{00021500-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ = "lnkfile" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\ÊôÐÔ\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{CABB0DA0-DA57-11CF-9974-0020AFD79762} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{CABB0DA0-DA57-11CF-9974-0020AFD79762}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{00021500-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\Open\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{FBF23B80-E3F0-101B-8488-00AA003E56F8} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\DefaultIcon regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\Open regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\ÊôÐÔ\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\ShellFolder\Attributes = "0" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\ regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\PersistentHandler regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214EE-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214EE-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{00021500-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellNew\Command = "rundll32.exe appwiz.cpl,NewLinkHere %1" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\DefaultIcon\ = "shdoclc.dll,-190" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214F9-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{FBF23B80-E3F0-101B-8488-00AA003E56F8}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\ÊôÐÔ\ = "ÊôÐÔ(&R)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214F9-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\InfoTip = "@shdoclc.dll,-881" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ = "InternetShortcut" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214EE-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{00021500-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214EE-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214F9-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214F9-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\Open\ = "´ò¿ªÖ÷Ò³(&H)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\Shell\ÊôÐÔ regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AEF9E8-663F-0757-829C-A93675896E86}\ShellFolder regedit.exe -
Runs regedit.exe 2 IoCs
pid Process 4932 regedit.exe 3508 regedit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 86 PID 3888 wrote to memory of 4932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 86 PID 3888 wrote to memory of 4932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 86 PID 3888 wrote to memory of 2932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 87 PID 3888 wrote to memory of 2932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 87 PID 3888 wrote to memory of 2932 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 87 PID 3888 wrote to memory of 3508 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 89 PID 3888 wrote to memory of 3508 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 89 PID 3888 wrote to memory of 3508 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 89 PID 3888 wrote to memory of 3820 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 90 PID 3888 wrote to memory of 3820 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 90 PID 3888 wrote to memory of 3820 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 90 PID 3888 wrote to memory of 4684 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 92 PID 3888 wrote to memory of 4684 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 92 PID 3888 wrote to memory of 4684 3888 4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe 92 PID 4684 wrote to memory of 1100 4684 cmd.exe 94 PID 4684 wrote to memory of 1100 4684 cmd.exe 94 PID 4684 wrote to memory of 1100 4684 cmd.exe 94 PID 4684 wrote to memory of 4884 4684 cmd.exe 95 PID 4684 wrote to memory of 4884 4684 cmd.exe 95 PID 4684 wrote to memory of 4884 4684 cmd.exe 95 PID 4684 wrote to memory of 440 4684 cmd.exe 96 PID 4684 wrote to memory of 440 4684 cmd.exe 96 PID 4684 wrote to memory of 440 4684 cmd.exe 96 PID 4684 wrote to memory of 2692 4684 cmd.exe 97 PID 4684 wrote to memory of 2692 4684 cmd.exe 97 PID 4684 wrote to memory of 2692 4684 cmd.exe 97 PID 4684 wrote to memory of 1388 4684 cmd.exe 98 PID 4684 wrote to memory of 1388 4684 cmd.exe 98 PID 4684 wrote to memory of 1388 4684 cmd.exe 98 PID 4684 wrote to memory of 4904 4684 cmd.exe 99 PID 4684 wrote to memory of 4904 4684 cmd.exe 99 PID 4684 wrote to memory of 4904 4684 cmd.exe 99 PID 4684 wrote to memory of 4984 4684 cmd.exe 100 PID 4684 wrote to memory of 4984 4684 cmd.exe 100 PID 4684 wrote to memory of 4984 4684 cmd.exe 100 PID 4684 wrote to memory of 1152 4684 cmd.exe 101 PID 4684 wrote to memory of 1152 4684 cmd.exe 101 PID 4684 wrote to memory of 1152 4684 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b54addc7de0d729fae86d5900252f38_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\$rar10987.tmp2⤵
- Modifies registry class
- Runs regedit.exe
PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$RAVSING.bat2⤵PID:2932
-
-
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /s C:\Users\Admin\AppData\Local\Temp\bbhhhik.tmp2⤵
- Modifies registry class
- Runs regedit.exe
PID:3508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$edbs.bat2⤵PID:3820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$rcqi.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\."3⤵
- Executes dropped EXE
PID:1100
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\.."3⤵
- Executes dropped EXE
PID:4884
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\desktop.ini"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
PID:440
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\GOOGLE~1.LNK"3⤵
- Executes dropped EXE
PID:2692
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\MICROS~1.LNK"3⤵
- Executes dropped EXE
PID:1388
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\SHOWSD~1.LNK"3⤵
- Executes dropped EXE
PID:4904
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\USERPI~1"3⤵
- Executes dropped EXE
PID:4984
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\WINDOW~1.LNK"3⤵
- Executes dropped EXE
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361B
MD5ee6683d37b35aefab668378230f6e956
SHA1a0aa06d7d10963af58b44ddee5f8c177ff061917
SHA256fb8e749b925ec65d3844e7ee48055fa6375b9fe988169fa8135ecb277452c2e2
SHA5127ca13b1ef07a4763406aaac8a841baafd3a1054dbdd1b3a51a1a1f2a8247d47f17ce826e8ebe2468ed0d3399c7634452d89a6a99e8ab3eeec9653614ae8f33c5
-
Filesize
59B
MD50cf180f20e716094bef34db0f1a39a04
SHA1f8e9da5d8eaf347b240a77c6a9c4f494d4fc351b
SHA2562a72298ec1d957d1d225aec50a4e6e32c5dec2f2645f25e580304e5c7ae5bb26
SHA512a471fee35dfc685effb46fcc37d47d7210fad3fdba7cb5342b13e11f95ae7690e4053b3399bca6da7546015a479ce55a301c6934be8bab7ec9eae5aece8bdb3b
-
Filesize
1KB
MD5f5ce77a1fe1093be0428776565201065
SHA1d44b219f3bda9d844ea79d1949a02c088e035952
SHA2564894cebd0f14cc42ee15ae47d6898eb71781408cb051b6083d3b52769a77db1a
SHA51284d0e79f7fbfa4ebfd9fef4a2cdb1d051ca763b1d422f781bf5f041a864bc509d93ccc2992a8d96c51f0fdac976109a1c5fe2d1395aae5906f0e8ecb6ee6d2ab
-
Filesize
1KB
MD5185038ec1cc9a69a109726c8989e4cf5
SHA1bfb62037297e8533e5f3940a32fb9505acf4fe26
SHA25648ccff6cd96445619998a70fad77f5e655a9d146b93d0d160656619728c4e727
SHA512bb0065a36a9bc48199943b21f3c3f10916fd15aa54201513f344464d962b5e6339e1df1b932043a914a662631f842a2f3b7a2c6e8c4e414567c5ea8ac9950391
-
Filesize
1KB
MD5836d4a32e0b5942962e63ffd6a1946f7
SHA1227624a15854815029f11f85ce2b933700e2fcda
SHA2563167781e0f005e4814c2d087d666dd876235f197fdb3ddaa76557ecb10624a66
SHA512490ef697ea4e2f91e2602736263deaa20e6a71918f70ce57dde4cb63e1cb2e7e36b46cd00de37508a9697cfcd63740c000d5920134388b1f622536fd635abf55
-
Filesize
4KB
MD5e65d0630e7c3363eff81fd64109c3dac
SHA1062d18f42ff35760bed198d51c1056a42c22bfba
SHA256286db12cc30d8834f18cbc2d72aab3cbc8ab4c515dc8f4e124c82eaa61e4061d
SHA512d4921c73729c5a00f9f2348d93cd0db827ea17cb45295f0f0b05d99597a241dab7703b674dd107e7a9d15854765b279af7d4f6b7ab8c44a1e658e361c63c0559
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c