Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMPLATES/setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMPLATES/setup.exe
Resource
win10v2004-20240802-en
General
-
Target
ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe
-
Size
388KB
-
MD5
ea3cb873084d15bb616da461122cf5a8
-
SHA1
655504b1aa501b9cef757578d887826c88dc18e9
-
SHA256
5aebdd15d9d937c587c1445199c1119cb4cc9ba75209156d223cba83daabb6d1
-
SHA512
ddb997d46d0cd8c93da2bab0e0b4c52f090ab5885bcc6e3a5902d82ce6239bf0878e5c4888e81e4d8d6e5f35952ac6f07952a0d39b682adf6e06f3c9c7128f41
-
SSDEEP
6144:xQq7zwkx+Gj2ldlTusrV9BWW7UmUZV/v6yTwVABUIwqgIt2ccJ5iYB735dMjSw6:70kfj2ldksVWWKcVoUBiQrAYBTDGb6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation cscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation l43.exe -
Executes dropped EXE 2 IoCs
pid Process 1564 l43.exe 4504 installstat.exe -
Loads dropped DLL 5 IoCs
pid Process 1920 ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe 1564 l43.exe 1564 l43.exe 1564 l43.exe 4504 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk43.icw l43.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installstat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234b4-9.dat nsis_installer_2 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1201132910" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433469978" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7311ABB2-761C-11EF-BFD9-42C951A4D69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000000e50672f72c8ad025a52fb395f6bbe5d1181f77e658e3f31101e670c1ac9ae5b000000000e8000000002000020000000f4afce120b9b5007d8b7316c5a1df535d10f58ae525a630386c6c006f373b92b20000000dad143b955ce5ad1800ebdeabfbe95e066c8142cc7c3ba0f2378979cfeacfe4840000000e8047d485ce2a0f03ed47315dd7908556617dedd28b0f30e55af37c301d93660c8c140533fd7c9b9243cfad2415a75e06314a7305851534fa80329c069348b9d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909d1f48290adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80582448290adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132201" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1201132910" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132201" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000007073e6b8a6ac41e4f7f47ddc7f01f31c984b13094d2f0ceb92112fe21e601b8b000000000e8000000002000020000000035ebba4f5946ccf151b0ff429605a7a6a2b1cb050f56d1bffc4358a524bafa620000000136104807d8ff3a62cb0d0967f27d1ce0a6c4575d6200ec3b192e655ab8a3930400000002c67eb5bd00938da0982add9de29d88c6a54b9ceb847c9c96b9606a2e44cbf742f3027622ce5f3838cb5ed071f48492cc2f6f43cc0e248cb74ae68207603e528 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1199726199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132201" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1199726199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw l43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine l43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" l43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell l43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" l43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" l43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" l43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile l43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open l43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command l43.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings cscript.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 4408 IEXPLORE.EXE 4408 IEXPLORE.EXE 4408 IEXPLORE.EXE 4408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1564 1920 ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe 84 PID 1920 wrote to memory of 1564 1920 ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe 84 PID 1920 wrote to memory of 1564 1920 ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe 84 PID 1564 wrote to memory of 1744 1564 l43.exe 85 PID 1564 wrote to memory of 1744 1564 l43.exe 85 PID 1564 wrote to memory of 1744 1564 l43.exe 85 PID 1744 wrote to memory of 4676 1744 cscript.exe 87 PID 1744 wrote to memory of 4676 1744 cscript.exe 87 PID 1744 wrote to memory of 4676 1744 cscript.exe 87 PID 1564 wrote to memory of 4504 1564 l43.exe 88 PID 1564 wrote to memory of 4504 1564 l43.exe 88 PID 1564 wrote to memory of 4504 1564 l43.exe 88 PID 2304 wrote to memory of 4408 2304 iexplore.exe 91 PID 2304 wrote to memory of 4408 2304 iexplore.exe 91 PID 2304 wrote to memory of 4408 2304 iexplore.exe 91 PID 1564 wrote to memory of 4900 1564 l43.exe 92 PID 1564 wrote to memory of 4900 1564 l43.exe 92 PID 1564 wrote to memory of 4900 1564 l43.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\l43.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\l43.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk43.icw"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk43.icw"4⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\a.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4828
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD533ebdde8b51ea0e7f5aa0a83b2265644
SHA1be0c08f1f3c712e7c88eaf1792db3e7b68953c39
SHA25625a237b2976bada35eda640d366a6923cb7d877452a39254028b063eace947fe
SHA5129a457bb35977ec153bda788fb046e2f847b83d1878358eb97e5f0b9a117e482d439599e710c92bf0a7e32af0fb60e8923178e9dd02d83d85da88aa589e0b11ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD533bac9325241193616461afd5a0deb0c
SHA1e78ed72996568bc9616f4d6b20403749252b4859
SHA256cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7
SHA5123054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5bdd3a5d7149afe72a384cab81cf8a3e2
SHA1ab29a206b137ec398dc843910ab8b5338ccd1467
SHA256e8e9d17991570b41f27474af46fbea8cb7a99aee837856b7f8776e1f87c00429
SHA512b1055de35d76b5476fca7c95906f993168feb2719642a9308916abd5515b8f6ed0fb848dd4964f11f795fde8e9442bed8e3c48143ed3ea1725dab628d60640a0
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
56B
MD5b850cad2b7b0f2868b92aa8164c5f765
SHA162e671e7fd9ccc004d53621b6b378acaa52295ea
SHA25628d14987e59854e2ec2fc46a05a05748f50f9db89cf180046e45a4874ac8db56
SHA512a5e6e954f7952717e859bd9e62cc0c52efa8052943e8db2f4cb3640e3e31f5f6d70f310a1176bfadfb84be9a0c94c919b12bb49a65f7c8a9018df238a4db2b61
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
840B
MD5fdf007061fa11ce3ffd8cf8f8ba0f818
SHA1a9746be7e1c744059f62bc7088552b36bdc0dd3e
SHA256fab27fd077a7db2b49a37465d0908241727e7cb230348ed8e0da9432dd6096d6
SHA512952a519b54b0f1dd0f6e3f1ef115b2923ee2356ed7ed80efd8abe55a300f40fdb68d3eafe918aa62fbea376bc4cac845df771a6393f590d0be444051ff65a476
-
Filesize
346KB
MD5552a4c8813767bbfc8f4ea544e56f6ac
SHA1343c95818d698d5ca80e0c962bf770221909f312
SHA25691d668957f7d4e345b899b11f82a76a7928364cc1be99a7f9b67808e8a2e1c1e
SHA512e194aea5bfc0642aa737064070612f6597586e3ca7c9b9701e5c730ee17c7b0c37500c78513a267e182b0d9ac0bf15374aa27ac4fea74515877796d8980c7072
-
Filesize
80KB
MD5b485de47dfa038e4fc1b6f1782d07ad0
SHA167b68902d56bb7cf1d3292bf152f85572fc53786
SHA25674ea2288ae1fad84f215ab40b0b9fbc0ae50996fe751fa5d615ae8586d1f4121
SHA5125558228f6fb0f92eba5035d4ea75e722c227566a4d71a523c517628d1cf4b0e2cfea94495cb09423b21276e0ef568545a3eb628daa7f94a258a8659ed5d6cdd7