Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
a719b99600f4380f0324409d69626167_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a719b99600f4380f0324409d69626167_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a719b99600f4380f0324409d69626167_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
a719b99600f4380f0324409d69626167
-
SHA1
564928648c3626fd81ef77b4ef27280122803f70
-
SHA256
376e51cda8b8bbe9c58bbce5456ec6dd49461a77038b1d1d6b1d3a72290d2741
-
SHA512
025fac508ba91876f4598786c6e7ffc9ecbe4dab84238d19a0ef949fdfa128fb1cb25900d9c0233f3ffb13bcfb03dcc64a2e4442afe90341bec53f225bcf1f43
-
SSDEEP
24576:KOwDwQfz+8MHUxym1+RAPxMVpP1NBOaB2j3LGGt6tmt8fIN:KRlfcH7mPPxcU6cpWg8fA
Malware Config
Extracted
cybergate
2.7 Final
Vectiiiiim
mixlolz.no-ip.biz:81
127.0.0.1:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
iexplorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{GY5NY1H3-64I6-H7O7-25K5-ELU86L85510U}\StubPath = "C:\\Windows\\install\\iexplorer.exe Restart" a719b99600f4380f0324409d69626167_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{GY5NY1H3-64I6-H7O7-25K5-ELU86L85510U} a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5800 iexplorer.exe 5892 iexplorer.exe -
Loads dropped DLL 3 IoCs
pid Process 2956 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 2956 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 5800 iexplorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\install\\iexplorer.exe" a719b99600f4380f0324409d69626167_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\install\\iexplorer.exe" a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 408 set thread context of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 5800 set thread context of 5892 5800 iexplorer.exe 33 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\install\iexplorer.exe a719b99600f4380f0324409d69626167_JaffaCakes118.exe File opened for modification C:\Windows\install\iexplorer.exe a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a719b99600f4380f0324409d69626167_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a719b99600f4380f0324409d69626167_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2956 a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2956 a719b99600f4380f0324409d69626167_JaffaCakes118.exe Token: SeDebugPrivilege 2956 a719b99600f4380f0324409d69626167_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 5800 iexplorer.exe 5800 iexplorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 408 wrote to memory of 2280 408 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 29 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2796 2280 a719b99600f4380f0324409d69626167_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\install\iexplorer.exe"C:\Windows\install\iexplorer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5800 -
C:\Windows\install\iexplorer.exeC:\Windows\install\iexplorer.exe5⤵
- Executes dropped EXE
PID:5892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD5047b869d4c4d61de1fe7cab04fb1be15
SHA10df3e0237664dc71519d876ea315c95d4c804eb3
SHA256dc13fcf878537ebe960721a15ef4d5fd9c7c728b19aef5558de43dbea7e5aa21
SHA512a27a99f5446f5a6d1feda7ce5f0df8278a6cdf3682372574cbb4c3bf454aba3d3b73f0f96d52155cb21d162cbbed60eb029eb4fcec3cc57cafab15f8a07f362a
-
Filesize
8B
MD5ea6e6f8d3f1bdbf0156025a877961c5a
SHA1a181a90fd8c1c32852c9d81d16b4671730c8b014
SHA2565bbd776a6d8a27bb2bccfe0c2abfca826a0c1a24bf2e0a51c2cea78f28b0c17e
SHA5126c425db8c023b41304034b51b9191f185b572f3e42ac31fe8700e6606b3009b39f9f8f69a833be66fa4ec40d539e227949cd59d52e52ba2818af285d7dcc0517
-
Filesize
8B
MD572413845ef470ac7cd1122627676f1eb
SHA1ac64ce8249145dda0d97763c130052504814a310
SHA2561dc26c44d6e9b84f10722edaadbe5d7f503da3e8a88bd21a0438928b7f2d32d0
SHA512a5d36124404741b4afd3648cbbbf2e17492035ba43375c9d8c74b73b3aa177be1b328e2a652573b2121332057b55b64dbb6a8f4e6fb2f46b0d3082b837ed8abc
-
Filesize
8B
MD58bae9bd5fa6235fefa465728e24a0a21
SHA11bb8c9ae6a6fa25463c16cdec51f282c04ac417c
SHA2568ee1eaaa38af2b603222a3012f95eb9fc214cc10c39b157e6a4301fe0cb9f16c
SHA5122a3ef5d16245a467240357d009ce0c428846f9512d429814a07b853f1fffd5efd5790586c1365b45efd5a5df25484833f40b66b103f658358fea12af25c79371
-
Filesize
8B
MD5651a219c6024bb41e8b603d90fb3aa1a
SHA17aa0e8a1c36c8dfeee2c941e4639a602eb4664ba
SHA256d8465a6e95d6b29aae98694b0aae61b99805204020c114f1ba647328012811cb
SHA512fdff09a158654b9cb3df80934a10317fea90352550b794ac53a64ae970cc1694d97cdf44f36cb275e1701ec698c26f3b1eb19f81c014d8017ff9e582f94c41a3
-
Filesize
8B
MD50ae03bed90922415c528011a7e6da8f0
SHA11197ad2fb8fbbcddb596c5cf7c5bd61d0a2e3705
SHA2560d0cb76735909854ba3039f2b8bd363c0eb29e088fc69fee9d7606a62d43c38e
SHA512d6e0590faca896ddec8064886336607bb93ad0cdfa30d62768d4a75d05337a279b46f4e54ed0bba1fb1295ed4fbce067ebbac4be451b6ab7dc055e5b79bb844a
-
Filesize
8B
MD50f6688330c40f743744a48721d20c687
SHA1ccd06fc3703a5446ea629cfacccc310b5f351084
SHA256034321cfbe552ebdd98c3f2e24921ab46f8ff21dac8960c95444e0330c62ad63
SHA512769b3991fc8e7fb1611d9784df7a59bb1780502f61d3fdfaace2c22f1ac74249a6e83f9517b3794c85c24aaf0c7cc432311e3d346952202129c4d4c45a132502
-
Filesize
8B
MD5211d48c204df164353d7a6e1e401a719
SHA1868544656329d6d589ec79d64477d1e5c8735f89
SHA256de518006a746b72a904695771bf58831bcffc18ff0e8f12df21dd320e49fe950
SHA512eeaa45e170b30c632ce58ce316c2e11b00871071d6979f380be8a65f490ea6d0c376169192fc10c1d3b82a3eec328dcf2aae09890ed76eb5ef55b1bfbe53582c
-
Filesize
8B
MD57be3eb80f01a05d1278f63e760b79ee6
SHA13ca1f9db86a419b5b07491094bfb80c7e292ca06
SHA256f94c6e3979342e5eaf54d808b95d4f8ca4780b63792754e334dbeeb49c3f7162
SHA5126c23083f8ba8c5fb01a499c071966cf7600f61b90552d7b02a6847493f814dcaeddae8bcdf588f93070b56f38ff4cd1eca4ecbd71c3919f2402cc2c63714dfbe
-
Filesize
8B
MD5648969846d39df28b206d7e39b282310
SHA166857c8ea5d5cc247145326e204c0d31ef3d619f
SHA256f35aafb3fc2d00de9b3cca0464ae114a9627d6136b4c0aa2c1b5343d766a9e75
SHA5124d1219103c77ea4ad1aae50a5faeae9313b9d9b25b705ba0dc5e02bd988bc4b89707fd64873dd78c991df91161f3768656da67d9c546ac4ae1f55121c21db1e6
-
Filesize
8B
MD518d8e40b1649dd7cd1c363771d750533
SHA1202f213c7271d56ae730916690400c073affa424
SHA256d5991c7fd0a4daeb01575572d5274d0f6898c9401544924749fd631d7d966fdd
SHA512f719772ab700b5b8437c74fa4a39b47380c35750e8ffae2ac3ec8c8249b5c3814c94337cf2f67c8e85b716d54e6a1f5aaecfcb02700933582046389ec43d9169
-
Filesize
8B
MD5f4a6a4f5ad36a6940bea292cf09deefd
SHA12287be54d64c13316d99958cbb84b09ef2b4c37c
SHA2561bf39c30e8e95d139ff95fc75570bca9017dcc14d8f37e3d39f1c151fdea7c73
SHA512ca00898fae45a4b5fe22811485509df172f64e1846f2f8289bd6eed69a65da8e1b60df07fe666ac69c9312643e4e346f014d26663996cdd688ad9750de40dbdc
-
Filesize
8B
MD52b26888fb3a65babf6c32b382bd76fa3
SHA1644017f8fae0800ca7b56145531198d3dc03bc73
SHA2562ba8231a67a6327db69d55c9508cd5091b722771e8da5c083e1c477f00425878
SHA512555f821b61f35656d967cc2a2741a0f19bc3992d49575fd65e9108a9e517655373312f5bbdb66954c8ef7ee4afb46b86aa41d287f45fe8a1538241fa33e94287
-
Filesize
8B
MD5cb590eb4405b15ffc28854100db7d6e4
SHA1a9a16a46a33149fd85ae594d1a997935d4d04671
SHA2567ebe4f1f1f57af75b019fc4378f4047c7cd267368f15af7f62d7b915352b065d
SHA51296a1d5a42051fd896a861920e803fa03fc7c6ffe82fefcdcfdff75166510a2f4821dc7c6d75fc94d4be61c8357bbd0d4f1f1c41645b06ee069621a18b47dcc48
-
Filesize
8B
MD5dd5aa5913a750dc44a5d730042036848
SHA159299c6a52335a94c770b2cfd70b0469aee6ce99
SHA256b08922e0fc695cf3697763263294ca8902e2908364c48e6d409dcbe46a320046
SHA512d82026ce55086ed9a8b48e37cfd8c57c72eceb730fe6541dc89f99b490d28dee325051e0bf87656e83f6842e1fa02e41fb9e244104fc9caf65f587e885178805
-
Filesize
8B
MD5ad96123c3e8cbc0811567eb83cc3e4e6
SHA1d541cdd4cbc79934845575156f21b261746f5936
SHA256791d15b965be0f31311be1a714ce80fe4f9ff5d49215d5e3c7330ca789bbd09a
SHA512cb8c6d15c711da56b5f6141ef6a332d02bca4edfe11b50395e5dbc70f7fff69779330153d26ce568f1305c2f1427837f7b3e1c7414552da3cbae8cc7b2dcb017
-
Filesize
8B
MD5062b81f1fcd2841130f81eb5e11b1b97
SHA1affdb69a6e69dbace9eb757dcf5c36127491868f
SHA25615d951b5bb64e2b16ace8a9656091118da7e83a2c07e648c813085015a92b3a9
SHA512ab1daaae74c0b04ec937b51391e9bc7c00d79f145170d3a44631269e7f2e8fe749b9bc8f1695308a870874ab531a0c5876f3804ca63f2f392e7f596fbb22d7f6
-
Filesize
8B
MD54c46b146bcbad78b44b73810f8415506
SHA1a116d5fb270477f2775b200c2d7a2a80f6625fcc
SHA256591895947479611074122b5bd3210891ed1e0bd0a8579da89298dcd6a948b3cd
SHA5123004d35dbd0522296df9c9a7b91d4d47513badff8b5e70e2cb18fd9d2404dca85abeb959e3a4e54fabaa45c400a8e3d894a24fcafea58e6dbb497738113404d0
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
1.2MB
MD5a719b99600f4380f0324409d69626167
SHA1564928648c3626fd81ef77b4ef27280122803f70
SHA256376e51cda8b8bbe9c58bbce5456ec6dd49461a77038b1d1d6b1d3a72290d2741
SHA512025fac508ba91876f4598786c6e7ffc9ecbe4dab84238d19a0ef949fdfa128fb1cb25900d9c0233f3ffb13bcfb03dcc64a2e4442afe90341bec53f225bcf1f43
-
Filesize
14B
MD5d975505d64330419813fbd2e2782dfcd
SHA1cf307e67396fdb89f6fff614a419efad9e8422e0
SHA2566fe3409a30a3aa66f4efb5984f72ecbe8fa1c654a9a84d5233591d367828faae
SHA512a11c603278c1084666f501642cf8a32f4e27df1d6b2dbd43a92975841e0eb2db33472d017feb85840308c370e5777f13ea80743dcf29ceff51a49529de2eb946