Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe
-
Size
78KB
-
MD5
cfeefe6f5b066de38fef45786b34e82a
-
SHA1
935020840ef9b8c5e58fa811d5cb197612af2805
-
SHA256
305d5c8c8f00e7156dfacbf2e49524b6e87e3e7d3d5cca083d6156a82193610f
-
SHA512
250276ced6b7d84b3126e8818207f6691f04f53bae7dfe40eb648cd2dcd6cdf9bf53fa5da3aefc6157430b2db8dab22a054eddac011e7b691b6efcbae8b9f1b3
-
SSDEEP
768:/dICxZk/89MpVT7woQJcW/bnqC03T/yEwSndA/zJmnPi3JnrpZdxEk+fVx6P3jM0:/TYd5QJc/vaSybs4Zr+fX6P3jg
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 1 IoCs
pid Process 4628 wmimgmt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: wmimgmt.exe -
pid Process 2016 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1712 tasklist.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimgmt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 4620 NETSTAT.EXE -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 3424 net.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 4528 ipconfig.exe 4620 NETSTAT.EXE 1808 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 400 systeminfo.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeBackupPrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeBackupPrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeRestorePrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeBackupPrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeRestorePrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeBackupPrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeRestorePrivilege 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe Token: SeDebugPrivilege 1712 tasklist.exe Token: SeDebugPrivilege 4620 NETSTAT.EXE Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeRestorePrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe Token: SeBackupPrivilege 4628 wmimgmt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 692 wrote to memory of 4628 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe 85 PID 692 wrote to memory of 4628 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe 85 PID 692 wrote to memory of 4628 692 cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe 85 PID 4628 wrote to memory of 2916 4628 wmimgmt.exe 88 PID 4628 wrote to memory of 2916 4628 wmimgmt.exe 88 PID 4628 wrote to memory of 2916 4628 wmimgmt.exe 88 PID 2916 wrote to memory of 1852 2916 cmd.exe 90 PID 2916 wrote to memory of 1852 2916 cmd.exe 90 PID 2916 wrote to memory of 1852 2916 cmd.exe 90 PID 2916 wrote to memory of 4060 2916 cmd.exe 91 PID 2916 wrote to memory of 4060 2916 cmd.exe 91 PID 2916 wrote to memory of 4060 2916 cmd.exe 91 PID 2916 wrote to memory of 1428 2916 cmd.exe 92 PID 2916 wrote to memory of 1428 2916 cmd.exe 92 PID 2916 wrote to memory of 1428 2916 cmd.exe 92 PID 1428 wrote to memory of 1876 1428 net.exe 93 PID 1428 wrote to memory of 1876 1428 net.exe 93 PID 1428 wrote to memory of 1876 1428 net.exe 93 PID 2916 wrote to memory of 4356 2916 cmd.exe 94 PID 2916 wrote to memory of 4356 2916 cmd.exe 94 PID 2916 wrote to memory of 4356 2916 cmd.exe 94 PID 4356 wrote to memory of 2492 4356 net.exe 95 PID 4356 wrote to memory of 2492 4356 net.exe 95 PID 4356 wrote to memory of 2492 4356 net.exe 95 PID 2916 wrote to memory of 1712 2916 cmd.exe 96 PID 2916 wrote to memory of 1712 2916 cmd.exe 96 PID 2916 wrote to memory of 1712 2916 cmd.exe 96 PID 2916 wrote to memory of 400 2916 cmd.exe 98 PID 2916 wrote to memory of 400 2916 cmd.exe 98 PID 2916 wrote to memory of 400 2916 cmd.exe 98 PID 2916 wrote to memory of 4072 2916 cmd.exe 100 PID 2916 wrote to memory of 4072 2916 cmd.exe 100 PID 2916 wrote to memory of 4072 2916 cmd.exe 100 PID 2916 wrote to memory of 1848 2916 cmd.exe 101 PID 2916 wrote to memory of 1848 2916 cmd.exe 101 PID 2916 wrote to memory of 1848 2916 cmd.exe 101 PID 2916 wrote to memory of 1828 2916 cmd.exe 102 PID 2916 wrote to memory of 1828 2916 cmd.exe 102 PID 2916 wrote to memory of 1828 2916 cmd.exe 102 PID 2916 wrote to memory of 2376 2916 cmd.exe 103 PID 2916 wrote to memory of 2376 2916 cmd.exe 103 PID 2916 wrote to memory of 2376 2916 cmd.exe 103 PID 2916 wrote to memory of 5100 2916 cmd.exe 104 PID 2916 wrote to memory of 5100 2916 cmd.exe 104 PID 2916 wrote to memory of 5100 2916 cmd.exe 104 PID 2916 wrote to memory of 924 2916 cmd.exe 105 PID 2916 wrote to memory of 924 2916 cmd.exe 105 PID 2916 wrote to memory of 924 2916 cmd.exe 105 PID 2916 wrote to memory of 3120 2916 cmd.exe 106 PID 2916 wrote to memory of 3120 2916 cmd.exe 106 PID 2916 wrote to memory of 3120 2916 cmd.exe 106 PID 2916 wrote to memory of 1504 2916 cmd.exe 107 PID 2916 wrote to memory of 1504 2916 cmd.exe 107 PID 2916 wrote to memory of 1504 2916 cmd.exe 107 PID 2916 wrote to memory of 684 2916 cmd.exe 108 PID 2916 wrote to memory of 684 2916 cmd.exe 108 PID 2916 wrote to memory of 684 2916 cmd.exe 108 PID 2916 wrote to memory of 4528 2916 cmd.exe 109 PID 2916 wrote to memory of 4528 2916 cmd.exe 109 PID 2916 wrote to memory of 4528 2916 cmd.exe 109 PID 2916 wrote to memory of 4620 2916 cmd.exe 110 PID 2916 wrote to memory of 4620 2916 cmd.exe 110 PID 2916 wrote to memory of 4620 2916 cmd.exe 110 PID 2916 wrote to memory of 2016 2916 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfeefe6f5b066de38fef45786b34e82a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\ProgramData\Application Data\wmimgmt.exe"C:\ProgramData\Application Data\wmimgmt.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /v:on /c C:\Users\Admin\AppData\Local\Temp\ghi.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\findstr.exefindstr /s "YM.CGP_" "C:\Users\Admin"\..\*.txt4⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\chcp.comchcp4⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Windows\SysWOW64\net.exenet user4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:400
-
-
C:\Windows\SysWOW64\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer"4⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\find.exefind "REG_"4⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office4⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\Software\Microsoft\Office\13.0\Common\UserInfo4⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4528
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano4⤵
- System Location Discovery: System Language Discovery
- System Network Connections Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -r4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print5⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\ROUTE.EXEC:\Windows\system32\route.exe print6⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
-
C:\Windows\SysWOW64\net.exenet start4⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start5⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\SysWOW64\net.exenet use4⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo n"4⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Windows\SysWOW64\net.exenet share4⤵
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share5⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
C:\Windows\SysWOW64\net.exenet view /domain4⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\s.log "4⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\find.exefind /i /v "------"4⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\t.log "4⤵
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\SysWOW64\find.exefind /i /v "domain"4⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\s.log "4⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\find.exefind /i /v "¬A╛╣"4⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\t.log "4⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\find.exefind /i /v "░⌡ªµª¿"4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\s.log "4⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\find.exefind /i /v "├ⁿ┴ε"4⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\t.log "4⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\find.exefind /i /v "completed successfully"4⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5cfeefe6f5b066de38fef45786b34e82a
SHA1935020840ef9b8c5e58fa811d5cb197612af2805
SHA256305d5c8c8f00e7156dfacbf2e49524b6e87e3e7d3d5cca083d6156a82193610f
SHA512250276ced6b7d84b3126e8818207f6691f04f53bae7dfe40eb648cd2dcd6cdf9bf53fa5da3aefc6157430b2db8dab22a054eddac011e7b691b6efcbae8b9f1b3
-
Filesize
43B
MD505bf969be5ffa8286a5cec181fd7bf47
SHA1f78e8cbf49b446ab78e1af28913eaeb0bb3e5cea
SHA25631ca14f34200304839a5e233241ebd5e58bd5a147a4e788d125eb8f227363e1e
SHA5121fb94d34f9a52cd16dfb5a8a059f65d1672dfa5de42da7ba5f8f0964bf39dbe47b4e99084cbb757cc87c0df5a0a7f101ec49ea27df3f266de488c55b9a85a516
-
Filesize
12KB
MD5d189b252d2a4a3e9fe9b85293a463718
SHA17da2f42be724ed79d0cd43e4c06db2c973533ddf
SHA256b5b78db17cf0810302db54f41fbd0cba66b95b89342e6b2447f8487b08add98c
SHA512091b0a5787d48a3a3603bcd177d6e53adfe03cfce29f39c6fbe21d124638616fa0e133349e569137a404eadb6ffeb411b34fc679275257cb8eff3edbafe4151c
-
Filesize
21KB
MD594d26da6a9d080d01d93e21280c869b0
SHA174a47ddb9ee815a886909e1902af795dd3e37fbf
SHA25673cc17751eccd561e8451e0e9c35a3516c81ce0017d5a34b221948c6b34e3657
SHA51222e45b3f9eb9ca7d405e3c2d0b08bc4768019770ede79ff7b7b893742fb04db87fa4ba260481d226e894e10b1483d27f484973e664ecf8a432aaadcf5e516e1e
-
Filesize
37.5MB
MD5770c82eab1f85f8acdac36b6ecf77fd9
SHA1ec2a70969dd49149e896d1d501ec5d2d60d15a20
SHA2569ef0b2c0f2008c605a9989adf07b718f2d7b5fabe4feeb25cbbc7a4bdc42e7d8
SHA512e5e541656bf3ecf85900d8eda94a241f19b8f8f858577fbe00d46cfe217455dc7d0ee8d97385682d1b53cf3a2d2c1174b357dad58633befea683d6e79adfb49c
-
Filesize
15B
MD54ff8e80638f36abd8fb131c19425317b
SHA1358665afaf5f88dfebcdb7c56e963693c520c136
SHA2566b8ceb900443f4924efd3187693038965ad7edb488879305489aa72d78f69626
SHA512d4e6e3d789bc76102c500b46a5aa799c5ebfc432a44117aa0b7c7512439d33a423630b963fb04cda1da17a7f6517b276a3e9298c17cbf795964090f4b9e5d8f1
-
Filesize
3KB
MD5b98e8fcde49a1caee295a6bd3d264e56
SHA171c82391a8617212ad48c8d79755e71be2e20be9
SHA256e369c7e2e7ac0280882693038b213be0309c910df62f35a5159a125ecd18fb9a
SHA512fb5fa414449e7dd4ce1fedcb92487f59ed18d7fbd3146eb59ec8f7256d68551adebb7d35e859fe7b6bce5a0b042b0de1e9ee56369a8686976dd121b44ff46742