Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
94f43772a6e9b5ba903830d941c829b1
-
SHA1
1fbcbe170639bd25d6c408692aa039b81530b804
-
SHA256
83d9d45edb2a88ff1ee264ab7270ca12ce06c806a6a68ea13d9b0396673a56fb
-
SHA512
d5703d806ac4b096c2a87b13d1896a34b78048d4337725e1961ed113c238961e09b9c9da3d24ccc6f8b4d139d0cb88345d0cb18b5e00ef1db6729edc6f143049
-
SSDEEP
49152:VuVsMMhKLl7SA6GLpjIBVw2sxl6HIKL/lO/NF1khpo3xPgWYmSowzjCLpwzBQTAw:+bs8pjI4/2w//1kU3xIXkit5JO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2704 Setup.exe 2204 IKernel.exe 2952 IKernel.exe 1712 iKernel.exe -
Loads dropped DLL 28 IoCs
pid Process 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 2704 Setup.exe 2704 Setup.exe 2704 Setup.exe 2704 Setup.exe 2704 Setup.exe 2704 Setup.exe 2204 IKernel.exe 2204 IKernel.exe 2204 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 1712 iKernel.exe 1712 iKernel.exe 1712 iKernel.exe 2952 IKernel.exe 2704 Setup.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe 2952 IKernel.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\core1ce3.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\corecomp.ini IKernel.exe File opened for modification C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuse1d02.rra IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\IScript\iscr1d22.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe Setup.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor1ce3.rra IKernel.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll IKernel.exe File created C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\obje1cf3.rra IKernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IKernel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IKernel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iKernel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FEBEC920-1849-11D3-A8FE-00105A088FAC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2066-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2065-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{91814EC1-B5F0-11D2-80B9-00104B1F6CEA}\ = "ISetupCABFile" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7BB118F1-6D5B-470E-82D0-AFB042724560}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7BB118F1-6D5B-470E-82D0-AFB042724560}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{94F4A332-A2AE-11D3-8378-00C04F59FBE9}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D4FF39BB-1A05-11D3-8896-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9CFCFE67-0BB8-43E0-8425-378D0A02ACE4}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E1B9357F-24B9-11D3-88B2-00C04F72F303}\ = "ISetupInfo" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B16-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B964AF40-4AB7-11D3-A908-00105A088FAC}\ = "ISetupSDMessage" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}\1.0\FLAGS IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2067-CB55-11D2-8094-00104B1F9838}\ = "ISetupStringTable" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AA7E2087-CB55-11D2-8094-00104B1F9838}\InprocServer32\ThreadingModel = "Apartment" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3EDC2C10-66FE-11D3-A90F-00105A088FAC}\ = "ISetupGUIObject" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4DFB7010-41EB-11D3-BBBA-00105A1F0D68}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2583251F-0A04-11D3-886B-00C04F72F303}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{61892D50-28EF-11D3-A8FF-00105A088FAC}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DED5FEEC-225A-11D3-88AA-00C04F72F303}\TypeLib\Version = "1.0" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AF57A6F1-4101-11D3-88F6-00C04F72F303} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8415DE38-1C1D-11D3-889D-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{27D2CF3C-D5B0-11D2-8094-00104B1F9838}\1.0\0\win32 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6494206F-23EA-11D3-88B0-00C04F72F303}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B15-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B15A454-9067-4878-B10E-B9DFFE03049D}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{761C8359-55AF-4E7B-9C83-C1A927E0F617} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8415DE38-1C1D-11D3-889D-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{22D84EC7-E201-4432-B3ED-A9DCA3604594}\LocalServer32 iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AF57A6F0-4101-11D3-88F6-00C04F72F303}\TypeLib IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AF57A6F1-4101-11D3-88F6-00C04F72F303}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1F9922A2-F026-11D2-8822-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AF57A6F1-4101-11D3-88F6-00C04F72F303}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.User.1 IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDF8B49D-16D0-49A5-B133-ABE7DCC23DAF} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{067DBAA0-38DF-11D3-BBB7-00105A1F0D68} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}\1.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\engine\\6\\Intel 32\\iKernel.exe" iKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{112EB4F0-5A48-11D3-A90A-00105A088FAC} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2583251F-0A04-11D3-886B-00C04F72F303}\ = "ISetupBasicFeatureStateEvents" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2065-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{44D61997-B7D4-11D2-80BA-00104B1F6CEA}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2062-CB55-11D2-8094-00104B1F9838} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65D37452-0EBB-11D3-887B-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AF57A6F0-4101-11D3-88F6-00C04F72F303}\TypeLib\ = "{27D2CF3C-D5B0-11D2-8094-00104B1F9838}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{61892D50-28EF-11D3-A8FF-00105A088FAC}\TypeLib IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{15F051E6-59A9-11D3-A25D-06D730000000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDE94BF2-4FB9-11D5-ABAB-00B0D02332EB}\ProxyStubClsid32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8C3C1B15-E59D-11D2-B40B-00A024B9DDDD}\TypeLib\Version = "1.0" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2061-CB55-11D2-8094-00104B1F9838}\ = "ISetupObjects" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA7E2069-CB55-11D2-8094-00104B1F9838}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D4FF39B9-1A05-11D3-8896-00C04F72F303} IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{682C25C5-D7D9-11D2-80C5-00104B1F6CEA}\1.0\HELPDIR IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DED1EA29-3F89-11D3-BBB9-00105A1F0D68}\1.0\ = "InstallShield Script 1.0 Type Library" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C3C1B12-E59D-11D2-B40B-00A024B9DDDD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE6115A1-7DE5-48DC-AD2A-25060E00FCE2} IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D4FF39BB-1A05-11D3-8896-00C04F72F303}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{112EB4F0-5A48-11D3-A90A-00105A088FAC}\ = "ISetupWindowBillBoards" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{22D84EC7-E201-4432-B3ED-A9DCA3604594}\LocalServer32 IKernel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D4FF39BB-1A05-11D3-8896-00C04F72F303}\TypeLib\ = "{91814EB1-B5F0-11D2-80B9-00104B1F6CEA}" IKernel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{15F051E6-59A9-11D3-A25D-06D730000000}\ProxyStubClsid32 IKernel.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2704 2292 94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2704 wrote to memory of 2204 2704 Setup.exe 31 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33 PID 2952 wrote to memory of 1712 2952 IKernel.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94f43772a6e9b5ba903830d941c829b1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\pft1A18~tmp\Disk1\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2204
-
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD562d5f9827d867eb3e4ab9e6b338348a1
SHA1828e72f9c845b1c0865badaef40d63fb36447293
SHA2565214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5
SHA512b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732
-
Filesize
172KB
MD5377765fd4de3912c0f814ee9f182feda
SHA1a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1
SHA2568efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb
SHA51231befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710
-
Filesize
220KB
MD5b2f7e6dc7e4aae3147fbfc74a2ddb365
SHA1716301112706e93f85977d79f0e8f18f17fb32a7
SHA2564f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1
SHA512e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83
-
Filesize
338KB
MD593b63f516482715a784bbec3a0bf5f3a
SHA12478feca446576c33e96e708256d4c6c33e3fa68
SHA256fbf95719b956b548b947436e29feb18bb884e01f75ae31b05c030ebd76605249
SHA5122c8f29dda748e21231ab8c30c7a57735104b786120bb392eb1c20a320f2dddde392d136fd0c70853bb9af851bbe47df2955d8f9d5973b64870ac90bd12d2dd70
-
Filesize
423KB
MD52ac967473f9c189af9864e5126ee6b7e
SHA1bf73a96c48334de74c0cc257c822ed858aada2db
SHA2560e22ff520fd1b2f6e6d3a65b95bf0b350e1687c594854d2ff49d568515dfd25e
SHA5124f083e9237f5c23dd289c577ea4d9e8ac5ecb90303f598678e60f4c9bc35add5e9be86de9265d7b43157b379122891d105117433e94bfd13f2675253e5fdd18f
-
Filesize
444B
MD5ade3ff3e38c363cdb39bf4bd025ac05e
SHA1c8334ff250bb1c5dfcb4ff79ea842849741804e9
SHA25687f482c4988e40ee0124fefadccfd5655188f3aea061beb5d93b285b8725bfd8
SHA51240e0f66a17817928b906b2b7dead63fb4cc1fd00f903dbb475ed9bb55897c647383817112ea559029f5e42a6d866e796d450e24e94d11a0fbe76d4be45ca9f2b
-
Filesize
82B
MD59a33760271da0e5277e4413cb25fa02e
SHA14ac67428a3f33eb871f0fc3a25777e66110f8e51
SHA256b81389f61707291badbc8e00fbbbc5d473bb1895352fee89e4a88af258ba78b3
SHA51233e4e8364445a1a645f3deb603f77775339692d39a0304853ef10355150cc6914296b79ecfcec20310d6e2dbe08fce15df93b646d3b819802330d49d3501b62e
-
Filesize
135KB
MD51bebfe9d6d8e5ecba071fedd6b6a629b
SHA1c9a6b7dbfd8a46062b85c866fe6e7dd5256a9663
SHA256edeab5555ead1dcff5f339d3ffc3cf84a7da9c581307c7298a288ce87ca02981
SHA5123d07d163515745872c74555717175dfe34fa0cca227486c1fe5a47382950ab4f1d496a06a235ed01b1e24752ea7f783bd8a31ba0d9cb58744a0a949a9c53130f
-
Filesize
2.9MB
MD5df0bc03ce04478c18968fc36fec7aeb2
SHA1e0075ae4237613ded9d081f063acdfdb43a2662c
SHA2567c41a967ff6d070d690815614d9a017b68ae8a958ff204d087af86a1317dd35c
SHA512923984fbe44b9159aeffcda6ce6cf744cfa6a5cb035e66cbd9ef4db67ffc6da8afdcd093a6ab5032dc66686a4f4fb2c64e40ab8437fb418203af9e8850c7592d
-
Filesize
3KB
MD5487e6047b73aaf627cb042c2ca3d0d71
SHA1bfd2b9e9d65a92e5c3bd172a34846602b4fdd134
SHA2562c724778570a1c3a7391ec672e5b21c30ddf0d5369c89e3d6f2e164735c60159
SHA5123a06c2466ef745a525aebcd8f17971637d497275728f85b51d8acaa4238955c4b70b6c2d1b807b1c84cc12e0fb580454c06a0d8d7855cbae872096822b13834b
-
Filesize
10KB
MD5f266052a4452c36e507383d150fe6146
SHA184badb1c8bffe517ddda3065b0e22b1528ad7a24
SHA2562bff3e76aa29b08d8e1299365479ca3324012ca0306d2e253f66dd758ff2ba71
SHA512d759fb034b64ce29dcf0491f55d0bec25c0d09fd9b3483536630e75bd1c93d468545974d9ed81dffcd1593a9e67be4fbeaa55e262994ec74c4d509756903f0e2
-
Filesize
76KB
MD5003a6c011aac993bcde8c860988ce49b
SHA16d39d650dfa5ded45c4e0cb17b986893061104a7
SHA256590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a
SHA512032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7
-
Filesize
32KB
MD58f02b204853939f8aefe6b07b283be9a
SHA1c161b9374e67d5fa3066ea03fc861cc0023eb3cc
SHA25632c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998
SHA5128df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59
-
Filesize
600KB
MD5b3fd01873bd5fd163ab465779271c58f
SHA1e1ff9981a09ab025d69ac891bfc931a776294d4d
SHA256985eb55ecb750da812876b8569d5f1999a30a24bcc54f9bab4d3fc44dfedb931
SHA5126674ab1d65da9892b7dd2fd37f300e087f58239262d44505b53379c676fd16da5443d2292aeaae01d3e6c40960b12f9cac651418c827d2a33c29a6cdf874be43
-
Filesize
162KB
MD5c63ed941cf9d3ddb78f2b8b7ea9f1eb8
SHA141c4c327debc03ccb1e623a3f76fba53883d27a9
SHA256569b0cf5a4b6add514dca2bcc182b89dd3519e0d2d3c92ff720c6d7f2ec539bf
SHA512cdd10dcba1759559c5ba8035b62d1f7b0e9c62596aa0caac9c8f7fd47baac0fee33873a9f19ffa33a0f0f33b202d28e22e4bc39cbc8a28576e67b343e1be72cd
-
Filesize
180KB
MD58868ad87b2efec11c2c6a5ab26aa11a3
SHA129a3ccd0b34405827051d0a9803dab0cd6a28ec5
SHA2569877fc7491b55259db364b644dd8b5a1ac589d0b187dc1e52041323e76abd465
SHA5121bda6ffb775a56891fbc2c73ba7bbe93dffac64a29d72e096269f6993532458cb60c66be6dc5f44d643841c150b1dc13e17dd7b482400fec1d6ac66ad608f42f
-
Filesize
316KB
MD57409fc23b1f3ee88b29677b8dc961068
SHA1755842a4a8e095024d4d8e810870b672ffab266c
SHA256b50d6e5f174c22af8daaf46f55eb87ecd1e155783f25cdb12b4ec3bbed077fb8
SHA512ed5d3c44a1d030a07eed753676150cc0de78783ddb2b9c567853d508ab457f124abd23552c5ca637304ad6214126c1babd3f842cc7821d8141a29f1bb34de0e0