Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe
-
Size
170KB
-
MD5
d57f9da6f6579f72d45f5003119b76d8
-
SHA1
842711072af819ed5f69727d211ee97ab93f0c3a
-
SHA256
c2d5639b198e0f3c35c6d4ead201ac28fb69a0134d793f8a351a7684dbbb74e8
-
SHA512
abe597d041c344fe28bdd8642372a81a9001250681824c60ccae69771e825ced5ef0c4c3c27b7461a9b337e773bba838947587a39b6889e4a637434f2b037831
-
SSDEEP
3072:DOp8KRaug8q9/ZXoOIeBBMLE0Y11rP3jHkvpoGoFjT7rEzmZ/B9Ww2CUQGO/bF0P:iCKRaczLE0oHkvpoGoqzY3zF0rth
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 yqyw.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C19D2521-5CBD-87DA-D3C3-AE8CB3B5E502} = "C:\\Users\\Admin\\AppData\\Roaming\\Ynbux\\yqyw.exe" yqyw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqyw.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\64020CF8-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe 1724 yqyw.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeManageVolumePrivilege 2352 WinMail.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1724 yqyw.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe Token: SeSecurityPrivilege 1724 yqyw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2352 WinMail.exe 900 WinMail.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2352 WinMail.exe 900 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 WinMail.exe 900 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1724 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1724 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1724 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1724 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 30 PID 1724 wrote to memory of 1116 1724 yqyw.exe 19 PID 1724 wrote to memory of 1116 1724 yqyw.exe 19 PID 1724 wrote to memory of 1116 1724 yqyw.exe 19 PID 1724 wrote to memory of 1116 1724 yqyw.exe 19 PID 1724 wrote to memory of 1116 1724 yqyw.exe 19 PID 1724 wrote to memory of 1172 1724 yqyw.exe 20 PID 1724 wrote to memory of 1172 1724 yqyw.exe 20 PID 1724 wrote to memory of 1172 1724 yqyw.exe 20 PID 1724 wrote to memory of 1172 1724 yqyw.exe 20 PID 1724 wrote to memory of 1172 1724 yqyw.exe 20 PID 1724 wrote to memory of 1200 1724 yqyw.exe 21 PID 1724 wrote to memory of 1200 1724 yqyw.exe 21 PID 1724 wrote to memory of 1200 1724 yqyw.exe 21 PID 1724 wrote to memory of 1200 1724 yqyw.exe 21 PID 1724 wrote to memory of 1200 1724 yqyw.exe 21 PID 1724 wrote to memory of 896 1724 yqyw.exe 23 PID 1724 wrote to memory of 896 1724 yqyw.exe 23 PID 1724 wrote to memory of 896 1724 yqyw.exe 23 PID 1724 wrote to memory of 896 1724 yqyw.exe 23 PID 1724 wrote to memory of 896 1724 yqyw.exe 23 PID 1724 wrote to memory of 1700 1724 yqyw.exe 29 PID 1724 wrote to memory of 1700 1724 yqyw.exe 29 PID 1724 wrote to memory of 1700 1724 yqyw.exe 29 PID 1724 wrote to memory of 1700 1724 yqyw.exe 29 PID 1724 wrote to memory of 1700 1724 yqyw.exe 29 PID 1724 wrote to memory of 2352 1724 yqyw.exe 31 PID 1724 wrote to memory of 2352 1724 yqyw.exe 31 PID 1724 wrote to memory of 2352 1724 yqyw.exe 31 PID 1724 wrote to memory of 2352 1724 yqyw.exe 31 PID 1724 wrote to memory of 2352 1724 yqyw.exe 31 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1700 wrote to memory of 3048 1700 d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe 32 PID 1724 wrote to memory of 1932 1724 yqyw.exe 36 PID 1724 wrote to memory of 1932 1724 yqyw.exe 36 PID 1724 wrote to memory of 1932 1724 yqyw.exe 36 PID 1724 wrote to memory of 1932 1724 yqyw.exe 36 PID 1724 wrote to memory of 1932 1724 yqyw.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Ynbux\yqyw.exe"C:\Users\Admin\AppData\Roaming\Ynbux\yqyw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp58bbbc5e.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:896
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558B
MD53cc0012f96f8f44164c18d7de05023d9
SHA1c8feb560d751fe720c8bdb53f5e78aa92abb9a9e
SHA2562654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5
SHA512626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD5f270c5d55234d79d965b39fb3d68a8ff
SHA1cd7fd7ab95c76ee127cb2c488e600d81899bb4ec
SHA2568d0f012479618401329c9d74020121b7693d69cfe5945d9ad41e6b8d928e545d
SHA512004c5c1b949d2608071c9a46ad4857eee70ae778a67b6926c267a83df072e7cd59559f218f58ef099641f253713fb1e02a3edea861230ecb5de45bfdab0c931d
-
Filesize
2.0MB
MD58e4681a5be7365aa3589579e56962bc9
SHA1f99b80359608c914e72abe3087cf2a9bb86fab9e
SHA2566382c156cf9c48cd34b3f6853ef32c300958945d0a9732e0904963d21e951a8e
SHA51218979054c3f20064b771d99f366e8407c862498d228739197d4537e2cd774d07a00113ab92d3d4d477deccbcf3c7e8f5924863710143fcb9a05d64702bea3b7a
-
Filesize
8KB
MD574e6b0ab1a86236dd87e4106607325eb
SHA1603dce6ce49f05a7c629e4ca9508645927a9eea6
SHA2569c11389ad7717b35e5961691ff3209da951102aba762cefdf50f2b4a4821a0b5
SHA512f5dafe1daa5006696a9c8412de70d61e94948d920239b4628d3bb64908adb60b767671e582f8d5fdbe72796ec26bdb7f80dd3fac15b89a2b251a5b3a61350ecd
-
Filesize
2.0MB
MD5e0fcd7e76d494a23000b32c994af0467
SHA10e1a8744b44c2a8d78c96e0d4a40bd97a3268d9c
SHA256ca4ad806ffff707623fdc3d4a977bdd56d91bc486e7ac381f600d2e32bd04f6c
SHA51294d1e434b067eaca9b63f0b6d2628e79d4edade818d046f61a79b71e9ec08e69a7a1ef8b384f923e80f18a4926a9fff6e1b72af73ef704b22de058a343bbacc8
-
Filesize
2.0MB
MD5a9284f8993f4bfb30e2ead1deb621744
SHA1c7e85657a2e9461df9befeaa46224a578b63e3ea
SHA256e05661f7c98b7bb55127b30d8b93a0ff89617c28864640db4c62681dcc60f7c3
SHA5126aafa1315b9b405b97e9d4fc9dc1779b4fd0c58b1fce2b98d537573976aee7ae83e2c914105bdf8fe834b5d67f76b23ad6079613c7d7854f1aeea40d33e91422
-
Filesize
2.0MB
MD53e185a9a2cd4fd8fd2d2be276a9d5969
SHA1c56260eb2aaed7aee768a7a189edcc66d4cf9040
SHA2561c09553c3a74ed33b6d361674558074134302cafa9591933a788fbd4d637f903
SHA5128f3374b0136a571926bb16481e3f5e31f76fb2782555882247cba3708f34c5ab23f21ac123dde63a12e2005fe7a1cc952921cf80b49c971d0d59603360490bba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
271B
MD5a2b5a4e9006adcda1fafaa715cd105dd
SHA10b7ddd1f6fe95f1f16db4ae7cfb3e05a802afcd7
SHA25690116a372ce846d30f155be51fe6e6d906759ec1a5651d241ffa6d5a070e6e80
SHA512a7f490ed647eca942ac8be2efe6460db5f8873b0de57dfd6863b41592edd3077dd4155b345badfa1a358e206339676e0ad50825ec41d5115dfe235e787f8910c
-
Filesize
380B
MD59b5436796fef4dfcbab233e6248e0142
SHA17cd2b901d38d33fb03f04009a2d557c867a479d2
SHA2569526cd07fc32051c0c55eb2d44646e5eaf934c63121277ea0d43e549268626f2
SHA512ee7277a507fdd44322cab6e3c505c73ead45cc302c7302fbd47780d6e8af9fa10d6a3f112e276cac57e9e72c2a42fc800fd7f8d87b015f4e4c0d73ff2170ea6c
-
Filesize
170KB
MD5464a0425c86c966de4b120ab98e8a1c9
SHA1f269228501aebbe8cb442ad5314e24cbc8ec2ad4
SHA25612f16b953b1a4a1e900c350bd2d440ef0e80827c51a010a81a1e6bcc6f0634ad
SHA51215f121188e5c652c5218ac5c49e807fd01c451e536ce433d0f7bda1832f2a119fea246b051e5cac21943866e44ce66b21c73e630825c8917cdb913f91a14221d
-
Filesize
2KB
MD54eb16308cc053c67425606a266a079ab
SHA1d06013c92f90f5c61a4537ff19753537fd713623
SHA256bf59277c3ce17a24e4561d11a3411a2b8f9a1dafc4824ed05ffd57d7139ed1c8
SHA512949232a619080646cd2dae9cc7b3dd26d164770cebf17e01e1ed7a9c92f8d8791bb82edb0ab4eccc39f99674d239c7457a3bb2d42db80370e312d938ca23fe38
-
Filesize
2KB
MD58c4734136b9afe92b2b53f330322b83b
SHA17bbed3929a51537258c8270b3bee079b6a1f8ff6
SHA256a5e94c3ba5ee06a3f7adc9fb305f35d952c580d12dae9dd21a9642b707d1fbb3
SHA512d7d24fe0f289f91f3443f97da0225c43cab61968054abc5e8df22eaf181d3771db08e95f18c2092a44cffd64da089f473fad016856c92a5b127d8bffb893a30a
-
Filesize
11KB
MD58611bf016f4954a450117292758a0e3a
SHA177f78c6a89ff1208d66b3aab67bb943626f0d564
SHA2560b458b4459d30dc06b4e0e10df7599eb82c3bf321979870cbf8c5540ef564aab
SHA51263fb225d40be2c75a463da642d7ccb32999a5a02f60385a73cc7e0e34414aa453c92c52b84e81384d26aeb771f5f86593850bc7a2fb15fea3d2245b5b53ce0f6
-
Filesize
12KB
MD55dafab0a81f84a80b8273d8413e68d9d
SHA1bb61b53bdb787cb2a399cc566f756525a60f5c33
SHA2568949254e3b1a7e75a18653418d1865cc26c2f109d4119d67f9be6a117fac5d8b
SHA51265ac460f6414101b764e8bc6bc365f54675a478e293ec680c01780f98d7efae3198588ffbd8e8ec3d12a83373976333ed6744204c21ad9dffbb6b54b6468b988
-
Filesize
13KB
MD5fef67032323aef1de69c6239598e3aa4
SHA1d47f0846afd17eec4511a65543bafb135f144286
SHA256b2cc1421a765c91060933650c4f3365ada250450a706c64a56e7e1279899ace5
SHA512f45541894a954b92ff0a0ccba747beb3af06316bd04d13b01f7a1a1641436737fa3264a82f9f5a26826c57b03485ed76ba821f39052917692942a4e3b71f7544
-
Filesize
15KB
MD537a05583fea368da1eba16b855c0ed38
SHA16c330f3e71373f9767190d99abdb5448a8d7c5c0
SHA256f7427c5b37633ee271379c59a986db253bc2b2e685d83f9c68e9b228359e3b2c
SHA512f472a83a1a3ebfedf092c1fd0e8093eb8826fb8f786423db01f9b00d1af8c41e9e72fd05d69fa82f51fd4a7c56520955ba910f5d510184cda5f144ad72d87ba8
-
Filesize
1KB
MD5137d4492cbd273257559530d1330a7ea
SHA185ffaf8418df122bc5df70e65c5c5db7a29be373
SHA25610d3ab37c96e6829aa89b45a90bfa4c29860b964c9ec059183ae70e2ad712912
SHA5125616ee04a3f3ed95f6f700f74312de16d59300d27ffe4a4580dacbae9cb3e4f43fc13172f7ad988ac833bfd91da2a2d9c09a3e75f03beeec94ec366788b12da0
-
Filesize
21KB
MD58cfb8eb4e02a75e9c8bffbf7fc290973
SHA1fba7057a5a8cd49f2b4b13e575d77e07e00bc726
SHA2560bf3ff3fcceb9047e7851db9571bf6ea2b5313fe3f9b7c56fc543357a67f811e
SHA51279e782991b7a075e294a57dddfb8b3ecf13ec9484cda75528b160138567a68e90a75a173fdebbb6f58fd9eb1a39bcf30131782d573326e88c490f87d9e015b68
-
Filesize
7KB
MD5cc57067a149505f8e126c437f9eb2b51
SHA1cffa4c6993e28770a883792f3a35d90c9defbf86
SHA2568fdb9a544418f3af6a12652b68ca8d1999c4f9a0a47d704e1d62ebdd6b52c987
SHA5125b3da134f7337c074b9dc63ce0b1cc2dd5de9bad94ea5a0cf05b544d7e6562c4d444f080504d3a4d975b034565be4ef21eced4cfa56921bd6600867196ca1364