Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/10/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
688e981a04241a918aac97054357008b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
688e981a04241a918aac97054357008b_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
688e981a04241a918aac97054357008b
-
SHA1
a144325ed430fbfb70d32e4830594dc9470af5c2
-
SHA256
4a01ae30245547e732dee65c67e8920e592beb370aeac21cba2f3aee44cbfbda
-
SHA512
277b9bf9c73d3e56cdc3299d89627438ade20612bd1c2367666682cd3648051a5154859d47e0c824f2b172b7066630c82128d87527e582c6907fc0e06cf3d382
-
SSDEEP
24576:YeHe8fAIwgw4lAAx9BhmroAGKmErF5HTMHHkeDz4GsiiSVTcon/lwNy9OIUcYH2u:YeHe8fAIwgw4lAAx9BhmnmAzEkoEondY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 688e981a04241a918aac97054357008b_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2032 attrib.exe 2932 attrib.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 archivoMZ 2620 msdcsc.exe -
Loads dropped DLL 6 IoCs
pid Process 2140 archivoMZ 2140 archivoMZ 2140 archivoMZ 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 2140 archivoMZ -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 688e981a04241a918aac97054357008b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\CoreAAC.ax archivoMZ File created C:\Windows\SysWOW64\CoreAAC.ax archivoMZ -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2412 set thread context of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language archivoMZ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688e981a04241a918aac97054357008b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688e981a04241a918aac97054357008b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1644 cmd.exe 2940 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000f000000012782-14.dat nsis_installer_1 -
Modifies registry class 19 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\FilterData = 020000000000800002000000000000003070693300000000000000000200000000000000000000003074793300000000700000008000000031747933000000007000000090000000317069330800000000000000010000000000000000000000307479330000000070000000a00000006175647300001000800000aa00389b71ff00000000001000800000aa00389b714d50344100001000800000aa00389b710100000000001000800000aa00389b71 archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBFC1A2A-D3A2-4610-847D-26592022F86E}\InprocServer32\ = "C:\\Windows\\SysWow64\\CoreAAC.ax" archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4665E44B-8B9A-4515-A086-E94ECE374608}\ = "CoreAAC Audio Decoder About" archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\FriendlyName = "CoreAAC Audio Decoder" archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\CLSID = "{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC} archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\ = "CoreAAC Audio Decoder" archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\InprocServer32\ = "C:\\Windows\\SysWow64\\CoreAAC.ax" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBFC1A2A-D3A2-4610-847D-26592022F86E}\InprocServer32 archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBFC1A2A-D3A2-4610-847D-26592022F86E}\InprocServer32\ThreadingModel = "Both" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4665E44B-8B9A-4515-A086-E94ECE374608} archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\InprocServer32 archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC}\InprocServer32\ThreadingModel = "Both" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBFC1A2A-D3A2-4610-847D-26592022F86E} archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4665E44B-8B9A-4515-A086-E94ECE374608}\InprocServer32\ThreadingModel = "Both" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{6AC7C19E-8CA0-4E3D-9A9F-2881DE29E0AC} archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BBFC1A2A-D3A2-4610-847D-26592022F86E}\ = "CoreAAC Audio Decoder Info" archivoMZ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4665E44B-8B9A-4515-A086-E94ECE374608}\InprocServer32 archivoMZ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4665E44B-8B9A-4515-A086-E94ECE374608}\InprocServer32\ = "C:\\Windows\\SysWow64\\CoreAAC.ax" archivoMZ -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2940 PING.EXE -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeSecurityPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeSystemtimePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeBackupPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeRestorePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeShutdownPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeDebugPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeUndockPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeManageVolumePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeImpersonatePrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: 33 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: 34 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe Token: 35 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2140 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2096 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2096 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2096 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2096 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 32 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 2412 wrote to memory of 1084 2412 688e981a04241a918aac97054357008b_JaffaCakes118.exe 34 PID 1084 wrote to memory of 1176 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 35 PID 1084 wrote to memory of 1176 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 35 PID 1084 wrote to memory of 1176 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 35 PID 1084 wrote to memory of 1176 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 35 PID 1084 wrote to memory of 1128 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 37 PID 1084 wrote to memory of 1128 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 37 PID 1084 wrote to memory of 1128 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 37 PID 1084 wrote to memory of 1128 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 37 PID 1084 wrote to memory of 1644 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 39 PID 1084 wrote to memory of 1644 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 39 PID 1084 wrote to memory of 1644 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 39 PID 1084 wrote to memory of 1644 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 39 PID 1176 wrote to memory of 2032 1176 cmd.exe 40 PID 1176 wrote to memory of 2032 1176 cmd.exe 40 PID 1176 wrote to memory of 2032 1176 cmd.exe 40 PID 1176 wrote to memory of 2032 1176 cmd.exe 40 PID 1644 wrote to memory of 2940 1644 cmd.exe 42 PID 1644 wrote to memory of 2940 1644 cmd.exe 42 PID 1644 wrote to memory of 2940 1644 cmd.exe 42 PID 1644 wrote to memory of 2940 1644 cmd.exe 42 PID 1128 wrote to memory of 2932 1128 cmd.exe 43 PID 1128 wrote to memory of 2932 1128 cmd.exe 43 PID 1128 wrote to memory of 2932 1128 cmd.exe 43 PID 1128 wrote to memory of 2932 1128 cmd.exe 43 PID 1084 wrote to memory of 2620 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 44 PID 1084 wrote to memory of 2620 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 44 PID 1084 wrote to memory of 2620 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 44 PID 1084 wrote to memory of 2620 1084 688e981a04241a918aac97054357008b_JaffaCakes118.exe 44 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2032 attrib.exe 2932 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\archivoMZ\archivoMZ2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\RoamingFirewall.bat2⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\688e981a04241a918aac97054357008b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 44⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2940
-
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
711B
MD5e85e3640f2ca2878408c7d480348a192
SHA1b18e89db1690a5391cde793e7c61eb2bab773c5a
SHA2561f781d61657d1c071c6d251aadaaa84c5c658710e07f7f7c6e29ae7dc14dbd71
SHA512d87d6b483222cac17ed3829b484346eda080e57dd1c65001ec8f1b336f2f2e9afffc4854c5d74b0e1f0294f4abe4fe1d1aeac623ce020c7c25182e29d98f6184
-
Filesize
16B
MD5ad8f534ea726ddec58a390dee334362f
SHA1847339c3a250e6910602a8570156ac4559ef90c0
SHA2568a469c68715e6cda6c891a6c372b1560e17b9f8756e97f321a9d966986f960da
SHA5126eca7a37fedbd0c6ccc5e0ccec9e48641cd7d4bd6d2a1979dc0fb8b6950c264db48291f68b8cc50c987b98f551304e114c1ca916b1f88144e8fa6d50cf939a92
-
Filesize
252KB
MD51a216df3e4a5dc41f65640f3d2d84efe
SHA1f764a312a18957282d88e30b54a887a4ca7e507d
SHA2563b9fa35864192f51b38beeffdb62d4999033f0f0d382f2dfeab9d450980e370d
SHA512f86a3521beff1ec2e24d2afa930dcbcc182d9a061f2d9265e68e4408c1c127efd259223716675e92aab23d1bceb61e032286453b047eff4e64ad4d696942f5ab
-
Filesize
12KB
MD59aff00ec14e6cb71a13451011c580077
SHA15972140e4a0addb9eac685fe6037da7479f23ecf
SHA256cc8145683ad8fd77bd5cca193e84188e40d6d03a0a0d1d00e2bdbef91be96bb3
SHA512311abd4e9927c1424d794ba401f3935ad3b108a2124e58e0d29aa946514c7a1d62b9b08b013699f4f90796bdfb6c07211daddbb521c1d20ccee771f6ea43b110
-
Filesize
4KB
MD5419d642fe3436fda8bb22eea9c37a6ca
SHA1c1644131b880c6e03f14de3c79efd27093a77908
SHA25625c4f65b02eca4ad897d7a623b3ca1290bac836e98ab5ee5f6c527dfb6a41dd7
SHA51229df088e3b5189efd6fbeebc2f23c5850303d40fe5331cd336bb852d986f9ab66f7bcd963ebf8c4e4eea7d49a6590027490d651a3e4781024c7983a2c456a337
-
Filesize
1.4MB
MD5688e981a04241a918aac97054357008b
SHA1a144325ed430fbfb70d32e4830594dc9470af5c2
SHA2564a01ae30245547e732dee65c67e8920e592beb370aeac21cba2f3aee44cbfbda
SHA512277b9bf9c73d3e56cdc3299d89627438ade20612bd1c2367666682cd3648051a5154859d47e0c824f2b172b7066630c82128d87527e582c6907fc0e06cf3d382
-
Filesize
416KB
MD5980d3842c1b0114f53e783577a6fe7ac
SHA1ea09de5cc6901d1ef72501c5dac782e5e4b7507c
SHA25633581d2d6eb6700609d10581e2b6bcafe231e492c6f5b328751df9d0db5d581b
SHA512213bcd781a1aeed258adc9c2465b008b1f7ff5e765929aac5fc0a85bc9688952bfe9e7a194c02ba4c96804c599d753df944583e035f3e08776f9b5f821b43e50