Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe
-
Size
522KB
-
MD5
fdd9249c6515cbcf37b6a78312f6dbf3
-
SHA1
4f6899e0135e4f3b20c0e31c88b0b82dd85b1fe4
-
SHA256
59fb9642404b919528481fa867ff11c55b145521375ba163c9f1742bdb913ce0
-
SHA512
64ad3ce3a9346bd50267da6db8fc792cf9ae1f51ce6a87eb442d9c62547c8a11281fb915def60c8815ddfdb3122f158a286f4214a834ec1fc738e131df37d9ec
-
SSDEEP
12288:7q6my5cKp64B4JuQnNfIRoe2f8c26nV+V9y+eqo2SUzYr2aqR9tG:7ey55p64BAuQNgRobkc2c+fNoRUI2FPG
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 1956 svchost.exe 2616 7za.exe 300 ic9.exe 1696 E4U.exe 2152 EuroP.exe 2776 Gi.exe 2688 tbp.exe 404 geurge.exe -
Loads dropped DLL 51 IoCs
pid Process 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2616 7za.exe 2616 7za.exe 2616 7za.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 300 ic9.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 300 ic9.exe 1696 E4U.exe 1696 E4U.exe 1696 E4U.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 2776 Gi.exe 2776 Gi.exe 2776 Gi.exe 2688 tbp.exe 2688 tbp.exe 2688 tbp.exe 2152 EuroP.exe 2152 EuroP.exe 2152 EuroP.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1604 WerFault.exe 2776 Gi.exe 2776 Gi.exe 404 geurge.exe 404 geurge.exe 404 geurge.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qxafadotexa = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Gr10109.dll\",Startup" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewrgetuj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\geurge.exe" Gi.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: geurge.exe File opened (read-only) \??\r: geurge.exe File opened (read-only) \??\y: geurge.exe File opened (read-only) \??\g: geurge.exe File opened (read-only) \??\n: geurge.exe File opened (read-only) \??\h: geurge.exe File opened (read-only) \??\i: geurge.exe File opened (read-only) \??\j: geurge.exe File opened (read-only) \??\x: geurge.exe File opened (read-only) \??\z: geurge.exe File opened (read-only) \??\a: geurge.exe File opened (read-only) \??\b: geurge.exe File opened (read-only) \??\v: geurge.exe File opened (read-only) \??\k: geurge.exe File opened (read-only) \??\s: geurge.exe File opened (read-only) \??\m: geurge.exe File opened (read-only) \??\o: geurge.exe File opened (read-only) \??\p: geurge.exe File opened (read-only) \??\t: geurge.exe File opened (read-only) \??\u: geurge.exe File opened (read-only) \??\w: geurge.exe File opened (read-only) \??\e: geurge.exe File opened (read-only) \??\l: geurge.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
resource yara_rule behavioral1/memory/2776-80-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000a000000016d5e-79.dat upx behavioral1/memory/404-117-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2776-130-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/404-133-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 680 sc.exe 1840 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1604 2152 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ic9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EuroP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E4U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geurge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main Gi.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main geurge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1696 E4U.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2776 Gi.exe 2776 Gi.exe 2776 Gi.exe 2776 Gi.exe 404 geurge.exe 404 geurge.exe 404 geurge.exe 404 geurge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1956 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2616 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 32 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 300 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 34 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 1696 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 35 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2152 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 36 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2776 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2688 2684 fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe 38 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2152 wrote to memory of 1604 2152 EuroP.exe 39 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2688 wrote to memory of 1048 2688 tbp.exe 40 PID 2776 wrote to memory of 404 2776 Gi.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdd9249c6515cbcf37b6a78312f6dbf3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\7za.exeC:\Users\Admin\AppData\Local\Temp\7za.exe x C:\Users\Admin\AppData\Local\Temp\a1.7z -aoa -oC:\Users\Admin\AppData\Local\Temp -plolmilf2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\ic9.exe"C:\Users\Admin\AppData\Local\Temp\ic9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:300
-
-
C:\Users\Admin\AppData\Local\Temp\E4U.exe"C:\Users\Admin\AppData\Local\Temp\E4U.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E4U.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\EuroP.exe"C:\Users\Admin\AppData\Local\Temp\EuroP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gi.exe"C:\Users\Admin\AppData\Local\Temp\Gi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\geurge.exeC:\Users\Admin\AppData\Local\Temp\geurge.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:404
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:680
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)3⤵
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)4⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\tujserrew.bat""3⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\tbp.exe"C:\Users\Admin\AppData\Local\Temp\tbp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Gr10109.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Gr10109.dll",iep4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD53007639996c51ee004616559afd17713
SHA15e3a5666b03ad0ef6b142022e98df371e52fbbc9
SHA256f59196325f82ebda80cf0c8efefd0c1345afcd835f47219e484f3b95995cb3f0
SHA512af758ef925b61e7ee82004ff3d3fe6884cda25afb7683139a92bf0ee4565e8628c777792d10889af1b016a6afd1fdf7836b3da6c92a91e1e955b52b0737d8d4d
-
Filesize
115KB
MD533cdcbd7a92d6ad28402996c2dbbddee
SHA10236321eadc076ddc4c3c5680e165b93acbed43c
SHA2560e895d8e3b17000a61add0242a803f5e374fa005253c0f401f1e8ff6e5839547
SHA512deea9548e5bdfeac0fe95ef0f8f9697eced2ffd07a36733f6fc9a0e9e4fd3e6f561076b3f2f6cc3c6c5b692ccc092c8cb404121215882adc686d155ad7f42b38
-
Filesize
250KB
MD57d8de13c7aff86cf5c788b76904dddc0
SHA133588ca84170f60e8d905ea0da424c707c326b96
SHA2562309bf3fcb08a0e87856d6ce5210aa7ed1d03f06df3b637b95d97b3240832bee
SHA512b869b676d40a0bc210f4c3d57abe8f5effb9bee2c418bd843a1416df7ffd956c14377bf5f8a7e577da13487c9e688c710729d4e96b5dc4be16a74f3cf2ebc390
-
Filesize
80KB
MD5e7231bb1bd728f85bc2f181c9f1491c5
SHA1313b76ef8d91d67d99f6a1359c243a5b45d84d55
SHA256919f9c0ac573f4313a50cf2ec32c1e24172d6f8f9b6f3082e5d3509b19552848
SHA51273618baa39a8b899a803d1c079e5a44a3535a900bb3c5b6d25c43d9a43620151ce371a24102317579d88e7172c340d3620e58fdd7bb68b415d132ddd107c4897
-
Filesize
3KB
MD546e07fd3a40760fda18cf6b4fc691742
SHA153ee1a754bf5e94fa88a6ab8bb6120b4011afcfa
SHA256bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be
SHA512ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd
-
Filesize
59KB
MD54c6afd1229f3b51008786b8c2cef3729
SHA1d7ea831e4936dcd7e4816a617cfaa3b8b94fc631
SHA2563ec2c3e848ff3ae552d5253e5d7df45e9c61ca3108a4af158456adb0e8248b14
SHA5129c4d1b1f9c16bf99b9be5202a114bffacadf9c01a7266174f5594f722646175e6f41c8ec7755d59f899188c3dc5f6e79cf4799819a7bdfefb68cd411ccbb930c
-
Filesize
130B
MD5d08cb97e3b90ca2dac463f834008b9b9
SHA13db0d4da98d144669284f50d9e8ea87a988ac93a
SHA256033632928b0c1a737728bb51db824f5fc92c84cbebae99553e8a1f40bd05b8f9
SHA512d843a43695c808bf3ee6088e5213f5b97f225412c36a41778a41a950c7459e4e9c4332b98bc9007544863e4d39b5f11bf15308ceeaceff7320847d301febe97d
-
Filesize
523KB
MD5e92604e043f51c604b6d1ac3bcd3a202
SHA14154dda4a1e2a5ed14303dc3d36f448953ff6d33
SHA256fa252e501332b7486a972e7e471cf6915daa681af35c6aa102213921093eb2a3
SHA512ef396d94d83fd7a588c6e645ea5fcfe24390440a03b3bf0ecd05ca6749fd3f9561dfafe725ee0edea51a34d52af26cd311e768aa72f75686cc796abee4757d43
-
Filesize
17KB
MD57e6e73e7fc425de45afd9fe2b752dc63
SHA1662d4cda9dc247f570d2d3cb68d2f9a52ac65519
SHA25698bea02a7fb98e4c3c3ec916d31c145d667660c477421391c96118f1f9348a8a
SHA512ff82204793b6bf10415d5b08da1d137c2d27d4d0a1d18d7ca31604fbb372df5b3e54fcb369d2a28dd29ba7229af79b5fb3e5a288db37831d645471aaa632e0e9
-
Filesize
72KB
MD5eef34ac2017f57554229ff9fe485bb73
SHA1f7d23a4e9d561b69c1f2102cfce93936ed63a9bb
SHA2561d3a38047829167637de9948c60f76047962f3b312c740ef1ea57b2b624c8b32
SHA5128ee04d0c7215dab898e28e3ba3659029be382b45c8543c405fb05daf9a1df300970343e9690665114b690c9ee94bf4ff40efdc5a845203e0b87bbfd8a53f1185
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904