Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe
-
Size
162KB
-
MD5
d65351a2a07e4ab734085105c20499c8
-
SHA1
c577b752c4075ca9e20d1efb1fd2d852771011dd
-
SHA256
92037f333c0906022737babdcc34ba19a275de3db6c737c0db429de857ea85ba
-
SHA512
7c473592a161d133e3da355be743c4c0122b1cdbc82bd608d8f0d9a21cada2d91ab55c7c5e3845964488d0a949f01e47892ba8909e7fcbf91d5483b192184998
-
SSDEEP
3072:oYfP3qzHxUcp+lH3DZn4UfLufsKa3dOk0X7XpNjAoOpys8cZC39wE:os/q9l+lXDZJfLufs73dOk0XDpNjNOpy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 3856 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sound Config = "SndCnf.cpl" d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sound Config = "SndCnf.cpl" d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened (read-only) \??\B: d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateSetup.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Mozilla Firefox\uninstall\helper.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\VideoLAN\VLC\uninstall.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Program Files\7-Zip\Uninstall.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Drops file in Windows directory 50 IoCs
description ioc Process File opened for modification C:\Windows\RCXF518.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF5A1.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF516.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF54A.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF517.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF590.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\file0a0.dat d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF9AC.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\temp022.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF506.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF614.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF624.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF678.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF689.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF4E1.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF434.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF4F4.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF591.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF4E2.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF55D.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF57E.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF5E3.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF433.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF5D2.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF668.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF9BC.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF9FD.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF9FE.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF505.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF635.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File created C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF519.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF55C.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF603.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF655.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF69C.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF4F3.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF9EC.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF55B.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF56D.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF5B2.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF667.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF68A.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF68B.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF6BD.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF57F.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF6AC.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF52A.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe File opened for modification C:\Windows\RCXF656.tmp d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 884 wrote to memory of 220 884 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 85 PID 884 wrote to memory of 220 884 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 85 PID 884 wrote to memory of 220 884 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 85 PID 220 wrote to memory of 3856 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 86 PID 220 wrote to memory of 3856 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 86 PID 220 wrote to memory of 3856 220 d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe"C:\Windows\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe" ejecuta2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d65351a2a07e4ab734085105c20499c8_JaffaCakes118.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD521ac6a552be4e0afcd2af628780108f0
SHA1a8da5ca19f808666c3ecbcd7175214f07df8544b
SHA256f92101d268f817e892d037eea977651c661eb2e50d7b5a62c4109dc3757b16fa
SHA51285533af7cb7d5a0102125bfc99c9c90a2624da2f7421ddb781afbf0137a866b62bfeedbae2196320c5ca6d3ec71a4bbbbc4997cc69b5f526fd0c7664a848b150
-
Filesize
21KB
MD570cb4db66af0f4ee754ffbb92b3fa987
SHA108c786db5c9507dde8fe4ae32c697622d6031760
SHA256e9f31e20c915a095600590ce76b062cdc35e878ad493eb97f5d6e48a57ebf1b5
SHA5127cc6fc6b9a2c19b33cd1a96603b328315b263460ad6bb8c6a5b2bae9abdb6e0c532b69b4a72dca9e6ae48e18cbecf323f0ff6b555c48705b1b4a11c52c8d4a4a
-
Filesize
162KB
MD5d65351a2a07e4ab734085105c20499c8
SHA1c577b752c4075ca9e20d1efb1fd2d852771011dd
SHA25692037f333c0906022737babdcc34ba19a275de3db6c737c0db429de857ea85ba
SHA5127c473592a161d133e3da355be743c4c0122b1cdbc82bd608d8f0d9a21cada2d91ab55c7c5e3845964488d0a949f01e47892ba8909e7fcbf91d5483b192184998
-
Filesize
84B
MD5154f9ce83099aebf20ed0715a692a0fc
SHA1c60a4e6076c1f12ded62960228e96ed17445ec09
SHA2562a93d7519565a4eb79826d69ce8c96194ca36a09e671403d83b2b581da842993
SHA5121a8f19159b29f5bea40ad50159f90c5e7fc3b909ee505a961012d354c9e33d0fee9c6175df3d98c4870e57c796c7f07a814a5e79bd8f4e37af2c143f4525e753
-
Filesize
36KB
MD5400902aabd2fd5a6cf56186a50e377e1
SHA105b4ecd58e08de6f65d7cc6e98316ffadb2dffa7
SHA2561cfca96f7dee778fcbbd9c247098d505f4d408621f19c3e5b5c4424834d3c4e7
SHA512ae524cb8b4a1cf62cfe56563711cb802b2fd79d4f58ca0a223d68b48070091853b1c037757012ca66d06d086a09c17c2f4ac8c3b044a06866f31d890ae614d51
-
Filesize
1.7MB
MD5176cf0c6864b50b52797dc5388825e7d
SHA182331379c1bf684cee3da790f10be03c001c7de9
SHA256518bcffbbeee1f80943f123f5ab46cd374b428000d7627876c247c20e20d67e8
SHA512ef8e0e84d386e84c1c438556a27b871c63e584c0b1f7f7888ba220332c9ec9d8140b7508950c2defdf43976a1581ec7bc9b59255adc41b6fcc3989591736dd99
-
Filesize
1.7MB
MD5b6e924917cf1f5b39c7ba0dedaef3cc5
SHA164298259470a9575e23a538dec67f597a5dfd470
SHA2569dca2dfcd5085060137673ea9398dc0ee03ef7b72f36312605ded49caba71a49
SHA5122e3e7fe461162604dd47662eb7eacb8edc2907464653d4fb687dc294a0fb180fb141ce7861d610995d2b433e274d7b73fc720e2ec99c842355699ad16a2c0b02
-
Filesize
890KB
MD53b65c3b538f4e529d6cf0eda4fe7df47
SHA1db965ca1a5b373b4c85287d6150196b4a0915ab6
SHA256ff945bc21fc5c5b2e235fd0c916e337fad97fc32b4612aa2b1c3bc06e9a66de1
SHA51207929eb3fe7d738b517b27c4625a4f8ce6e5f6f9e9ea276e02ba7872f9e77fb6d9fded1934d205ed01d37fe1049416214d1148bcb8bad01cd038df7e4bff90ae
-
Filesize
84KB
MD512996dcfe8f3e8d9a56017a43d01c1d7
SHA12724e3a23a35d0f9f2e095a7b3b77dc244984442
SHA256a7b110f50ffcdfcfae7538e85cb7f9dc7b101aa7bf24113bb01bd1322b1cb946
SHA5129bf88cd85ca7e6fcdbe1d062e0a4c74b86745112ccc0bf243812085b427d7dd705a46a678fe8ab8b080be313af0e35b742f524e5e2cfbd7be2207ee3d23ebfc9
-
Filesize
102KB
MD59af37762c338c80c4e042a6c41c6455c
SHA17e1ca89e5a7e4ff900b8c2bd34560c2fe2a0e645
SHA256e01b104e3585d031294ab6a46b0f64d95944dfbbc8d2dee871b96bef3712d634
SHA512fadaf65e96f354f9ec1feb1fb11d32efd043cdece44f27990c369ebe140b83d6a8794351900a28e6b5100c4c54f2cf24cdf99d1f66c06752880b47aae94de6e2
-
Filesize
209KB
MD54ab594afb5ef76a191dbd2d21c59b10f
SHA199a2bc82824aabc65c257455455ec9ed2b4ba6a9
SHA256a1588adcc4f27aa1d6344f1f0b9bc0cfb7645d9a6e9d17d295565e3219cbefa9
SHA512a6fd3b2c21f685ff64c8a7760c9d153540f1cc8dfc0f8ae29abe4ddb132fd98f9b2890e2866b852419c00b6c353f0266da3f2f8ba7bc5611206db42b1fcbd27b
-
Filesize
30KB
MD5c59bdb3a888ace35b61d699951a66b58
SHA13f4c6ae7291a5d62c874ee07cc66d340ef4effb1
SHA2568efe32fc71a82e1229cf123730da86a802837cf6c47baf5278c37fa0db865f3e
SHA5126283a3b4f32d57f88288be5be149d8890db20da4717687101713482970028064ade07d26e42453ddd0fa133c9763eb841ebb9824330e5842289b7680c1249183