Analysis
-
max time kernel
70s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
-
Size
876KB
-
MD5
2f1dc5030efcb81959182c0382ad8d74
-
SHA1
901cde94badc1478b973d85c5862e5fe260cfa7f
-
SHA256
800900c169d3f7ab56983c0406a534b22a5652b1d3507b5e879adbb2bc2229f3
-
SHA512
eda73fd95f95b989a6f69888268b7c91291c22e061237a78e2ab1a704c7528645e0623b46fa7710b27d27f3bbfb15bff5fa81d47e88447749789c8d94c2c18d0
-
SSDEEP
12288:+QJ/WFun+/d0tnm2l8w58cBwbPh+b7ji75qFacYboBioTBzWj6G3u3EIO74qt:PWFY+ImI8hcqzQb7j6UFacrBpByuDgt
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000018fc7-72.dat family_ardamax -
Executes dropped EXE 5 IoCs
pid Process 2504 aaa.exe 2916 aa.exe 2692 a.exe 2700 alalal.exe 1656 HAWF.exe -
Loads dropped DLL 27 IoCs
pid Process 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 2504 aaa.exe 2504 aaa.exe 2504 aaa.exe 2504 aaa.exe 2504 aaa.exe 2916 aa.exe 2916 aa.exe 2916 aa.exe 2916 aa.exe 2916 aa.exe 2692 a.exe 2692 a.exe 2692 a.exe 2692 a.exe 2692 a.exe 2700 alalal.exe 2700 alalal.exe 2700 alalal.exe 2700 alalal.exe 2700 alalal.exe 1656 HAWF.exe 1656 HAWF.exe 1656 HAWF.exe 1656 HAWF.exe 1924 NOTEPAD.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HAWF Agent = "C:\\Windows\\SysWOW64\\28463\\HAWF.exe" HAWF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 HAWF.exe File created C:\Windows\SysWOW64\28463\HAWF.001 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.006 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.007 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.exe alalal.exe File created C:\Windows\SysWOW64\28463\key.bin alalal.exe File created C:\Windows\SysWOW64\28463\AKV.exe alalal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alalal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HAWF.exe -
Modifies registry class 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\0\win32\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\FLAGS HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Version\ = "1.0" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msvidctl.dll" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Programmable HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Programmable\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\ = "PortableDeviceConnectAPI 1.0 Type Library" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718} HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\ = "Qocaw Xalona" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Implemented Categories HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\0\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\FLAGS\ = "0" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B} HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\VersionIndependentProgID HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\VersionIndependentProgID\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\InprocServer32\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\ProgID HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\0\win32\ = "%systemroot%\\SysWow64\\PortableDeviceConnectApi.dll" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\TypeLib\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Implemented Categories\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\InprocServer32 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\ProgID\ = "MSVidCtl.MSVidFeatures.1" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Version\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\ProgID\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\TypeLib HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\TypeLib\ = "{455E46EA-2993-34A9-0966-6E82915CBD1B}" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\Version HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0 HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\0 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\FLAGS\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{455E46EA-2993-34A9-0966-6E82915CBD1B}\1.0\0\win32 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAF378E7-C000-4236-7B95-AD21457CA718}\VersionIndependentProgID\ = "MSVidCtl.MSVidFeatures" HAWF.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 2236 NOTEPAD.EXE 2960 NOTEPAD.EXE 1968 NOTEPAD.EXE 1924 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1656 HAWF.exe Token: SeIncBasePriorityPrivilege 1656 HAWF.exe Token: SeIncBasePriorityPrivilege 1656 HAWF.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1656 HAWF.exe 1656 HAWF.exe 1656 HAWF.exe 1656 HAWF.exe 1656 HAWF.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2236 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 1348 wrote to memory of 2504 1348 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 31 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2960 2504 aaa.exe 32 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2504 wrote to memory of 2916 2504 aaa.exe 33 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 1968 2916 aa.exe 34 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2916 wrote to memory of 2692 2916 aa.exe 35 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 2700 2692 a.exe 36 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2692 wrote to memory of 1924 2692 a.exe 37 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 2700 wrote to memory of 1656 2700 alalal.exe 38 PID 1656 wrote to memory of 2640 1656 HAWF.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\aaa.exe"C:\Users\Admin\AppData\Local\Temp\aaa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\alalal.exe"C:\Users\Admin\AppData\Local\Temp\alalal.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\28463\HAWF.exe"C:\Windows\system32\28463\HAWF.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\HAWF.exe > nul7⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD592e49800179523b787d6a68b6f588fde
SHA1999f3356bc22880b2542768e7470c9c6c067af41
SHA2565463b407f2cf32fbc61d5539b5e174b12823c95433c0c0e1f72b8412e7a108f0
SHA51249ee8cb83611157106bfe1ae11a1cb6ee880d4f1a0a650025c56116c4f055f8fd6341cd4fdd8e78604ac8a8a34e9a47144e0a3ce0c30281e100e2577e4b36260
-
Filesize
40B
MD50818a2155823f8c4d1e6b2a24d4b86ac
SHA13764085a15922b359b0d4a714c10dbd020f23f36
SHA256a49cafc9b464f56a529f917851d7f292969f157dffcc2392006bbe15811b489a
SHA512be3de98b5e25cccf6e50c6d78bae9fa00af54482d25e2caf1995f3808d4247d8f5251d535e08ee84c5d9b22e9bdad5d4765ba5ca8fdeaf672cda42eb7ded571d
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
446B
MD512f3f808506762ba31b6ab8ae9bef99c
SHA14aae9bef8ddd534e11a87f1be45a9be7cad3c4a4
SHA2567b76928bbb5948e2fb83915515b9d5ad0c596d5f5b2d46d2dc300089759f6be0
SHA512dc0465a96d52bfc52cc3a6182dfb9200f6a7b1b42a0d21f824089dc517376575e16117ebe38020df695d66a57580fd81de9929a3aa4b4575d580a33303cf616c
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
106B
MD5a7803747d88ef30694f734728947208f
SHA166d940969be262153388f57209f60b4840f78fa5
SHA2565a155301048acd3ee2e64682ca9ea92fed5a5821515ad1b94f0f9555f9198de4
SHA5127bc14fdc47f372bfa00d627afd3bbd76f4efdad86727b198ba85c151a5b6d25466836ac4f87a228128eb0d16254449b9e26e731ce781b6003a83892dabb4c185
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
813KB
MD5e2ebdccb8a3e4244261ca5ebb3d0f8a6
SHA1c70105a7b64287c4e53548b54be6fe9f242f95f0
SHA2562fc377e680565a454d7dc0e04c042dccc2a6306f4368d93de59d69821842457d
SHA512208aa92a162e231b59730d1c4636ea2826920c5ecf94cc062640c1bfe792e6db5091653add3628c0d624185fa0e4a2384825dd1422aa4406ade0ed13cca148cd
-
Filesize
834KB
MD53e5692e2d63f4b33d6a7fccc78fe451c
SHA12c4c3487971a5255fc939af71d1946b7cc61da62
SHA2562ae2e6e62602a9129be56ee9a0459f35fe1e09885718e009b317e8f5db72cf88
SHA512000855c58488f519b70c29612547edd82212badc65dc720bea5209cf3fd733410191ec6862124831ac4a3fd40ab556f92165e6e91dfc1b14e569414cdb432cf4
-
Filesize
783KB
MD5d8e63038cd315c939bceb4333959c8ff
SHA12bc6b710064dfa44f13dec3b0631c9203b5a484f
SHA2565bb8b60c931e2dc1b3080471ffc9b0612d1b5d9055a63feb07fb3db5d8f4d6cf
SHA51254f8a2403496097b30bb8cf444dec7b3868dc57b80d8d96b385d406eb5a2482711cb2ec8bdfcb8b49e63784973513dee5187996af996379a416fbd8602b2ba5b